In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender.
View Article and Find Full Text PDFThe SARS-CoV-2 infection (COVID-19) pandemic created an unprecedented chain of events at a global scale, with European counties initially following individual pathways on the confrontation of the global healthcare crisis, before organizing coordinated public vaccination campaigns, when proper vaccines became available. In the meantime, the viral infection outbreaks were determined by the inability of the immune system to retain a long-lasting protection as well as the appearance of SARS-CoV-2 variants with differential transmissibility and virulence. How do these different parameters regulate the domestic impact of the viral epidemic outbreak? We developed two versions of a mathematical model, an original and a revised one, able to capture multiple factors affecting the epidemic dynamics.
View Article and Find Full Text PDFOver the last decade, virtual reality (VR) has become an increasingly accessible commodity. Head-mounted display (HMD) immersive technologies allow researchers to simulate experimental scenarios that would be unfeasible or risky in real life. An example is extreme heights exposure simulations, which can be utilized in research on stress system mobilization.
View Article and Find Full Text PDFIn this paper we investigate the essential minimum functionality of the autonomous blockchain, and the minimum hardware and software required to support it in the micro-scale in the IoT world. The application of deep-blockchain operation in the lower-level activity of the IoT ecosystem, is expected to bring profound clarity and constitutes a unique challenge. Setting up and operating bit-level blockchain mechanisms on minimal IoT elements like smart switches and active sensors, mandates pushing blockchain engineering to the limits.
View Article and Find Full Text PDF