13 results match your criteria: "Center for Cybersecurity Systems and Networks[Affiliation]"
Front Big Data
December 2024
School of Business, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, Kerala, India.
Introduction: The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised to enhance the effectiveness of cybersecurity strategies by offering advanced capabilities for intrusion detection, malware classification, and privacy preservation. However, this work addresses the significant lack of a comprehensive synthesis of AI's use in cybersecurity and privacy across the vast literature, aiming to identify existing gaps and guide further progress.
View Article and Find Full Text PDFHealth Policy Plan
December 2024
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, 690525, Kerala, India.
Menstrual hygiene management among girls in rural India poses a substantial challenge for public health, education, and quality of life, exacerbated by limited access and affordability of menstrual products. In response to these issues, the Government of India initiated the Menstrual Hygiene Scheme (MHS) to enhance access and awareness. This study evaluates the impact of the MHS in Assam and Tripura designated" treatment states" with consistent pad supply from 2017 to 2021 compared to neighboring" control states" with negligible pad distribution.
View Article and Find Full Text PDFSci Rep
September 2024
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, Kerala, 690525, India.
The predominant use of disposable, non-organic menstrual products has significant environmental impacts due to waste and resource depletion. Concerns over the environmental, economic, and health implications of menstrual hygiene management (MHM) have highlighted the need to explore sustainable options like reusable sanitary pads (RSPs). Despite their benefits, the adoption of RSPs is limited by a lack of awareness, availability, cost, and research.
View Article and Find Full Text PDFSensors (Basel)
August 2024
Computing Sciences, Jacksonville University, Jacksonville, FL 32211, USA.
Intrusion detection systems have proliferated with varying capabilities for data generation and learning towards detecting abnormal behavior. The goal of green intrusion detection systems is to design intrusion detection systems for energy efficiency, taking into account the resource constraints of embedded devices and analyzing energy-performance-security trade-offs. Towards this goal, we provide a comprehensive survey of existing green intrusion detection systems and analyze their effectiveness in terms of performance, overhead, and energy consumption for a wide variety of low-power embedded systems such as the Internet of Things (IoT) and cyber physical systems.
View Article and Find Full Text PDFHeliyon
February 2024
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, 690525, India.
In the digital age, where information is a cornerstone for decision-making, social media's not-so-regulated environment has intensified the prevalence of fake news, with significant implications for both individuals and societies. This study employs a bibliometric analysis of a large corpus of 9678 publications spanning 2013-2022 to scrutinize the evolution of fake news research, identifying leading authors, institutions, and nations. Three thematic clusters emerge: Disinformation in social media, COVID-19-induced infodemics, and techno-scientific advancements in auto-detection.
View Article and Find Full Text PDFHeliyon
November 2023
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation. Technological advancements like Tor, bitcoin, and cryptocurrencies allow criminals to carry out these activities anonymously, leading to increased use of the Darkweb. At the same time, computers have become an integral part of our daily lives, shaping our behavior, and influencing how we interact with each other and the world.
View Article and Find Full Text PDFFront Psychol
April 2023
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Kollam, Kerala, India.
Laboratory education is essential for enhancing both the understanding of concepts and skills of students. A significant barrier to excelling in laboratory practices relates to a lack of self-efficacy. Being complementary to mainstream theoretical learning, the contribution of laboratory education to impart knowledge and hands-on proficiency is often under-represented.
View Article and Find Full Text PDFEduc Inf Technol (Dordr)
December 2022
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, 690525 Kerala India.
Synthesizing the advancements in technology with classroom practices depends considerably on teachers acceptance of such internet and communication technology (ICT) tools. Adequate teacher training and upgrading of their IT skills are not prioritized in developing economies leading to poor adoption of emerging technology assisted pedagogic interventions. This paper investigated the underlying characteristics of teachers acceptance of mobile friendly virtual laboratories (M-VLs) as part of a longitudinal study conducted over 5 years covering both pre-pandemic and pandemic periods.
View Article and Find Full Text PDFHeliyon
November 2022
Department of Civil and Industrial Engineering, Clemson University, Clemson, SC, USA.
An increase in adolescent social media use has exacerbated cyberbullying globally. Instagram has the highest percentage of adolescent users experiencing cybervictimisation. While past research has delved into self-driven or peer-driven motivations of cyberbullying, theory-driven research characterising external factors is integral to understanding the psyche of cyberbullies, victims, or bystanders.
View Article and Find Full Text PDFEduc Inf Technol (Dordr)
April 2022
Center for Research, Analytics and Technology in Education (CREATE) and School of Computing, Amritapuri, Amrita Vishwa Vidyapeetham, Amritapuri, India.
Online and virtual teaching-learning has been a panacea that most educational institutions adopted from the dire need created by COVID-19. We provide a comprehensive bibliometric study of 9523 publications on virtual laboratories in higher education covering the years 1991 to 2021. Influential bibliometrics such as publications and citations, productive countries, contributing institutions, funders, journals, authors, and bibliographic couplings were studied using the Scientific Procedures and Rationales for Systematic Literature Reviews (SPAR-4-SLR) protocol.
View Article and Find Full Text PDFInt J Educ Technol High Educ
July 2021
Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, 690525 India.
Unlabelled: Access and personalized instruction required for laboratory education can be highly compromised due to regulatory constraints in times such as COVID-19 pandemic or resource shortages at other times. This directly impacts the student engagement and immersion that are necessary for conceptual and procedural understanding for scientific experimentation. While online and remote laboratories have potential to address the aforementioned challenges, theoretical perspectives of laboratory learning outcomes are critical to enhance their impact and are sparsely examined in the literature.
View Article and Find Full Text PDFJMIR Pediatr Parent
February 2021
Department of Neuropsychiatry and Behavioral Sciences, University of South Carolina, Columbia, SC, United States.
Background: Web-based challenges, phenomena that are familiar to adolescents and young adults who spend large amounts of time on social media, range from minimally harmful behaviors intended to support philanthropic endeavors to significantly harmful behaviors that may culminate in injury or death.
Objective: This study aims to investigate the beliefs that lead adolescents and young adults to participate in these activities by analyzing the amyotrophic lateral sclerosis (ALS) ice bucket challenge, representing nonharmful behaviors associated with web-based challenges, and the cinnamon challenge, representing web-based challenges that lead to harmful behaviors.
Methods: A retrospective quantitative study was conducted with a total of 471 participants aged between 13 and 35 years who either had participated in the ALS ice bucket challenge or the cinnamon challenge, or had never participated in any web-based challenge.
PeerJ Comput Sci
July 2018
Amrita School of Biotechnology, Amrita Vishwa Vidyapeetham, Kollam, Kerala, India.
Background: Several new programming languages and technologies have emerged in the past few decades in order to ease the task of modelling complex systems. Modelling the dynamics of complex systems requires various levels of abstractions and reductive measures in representing the underlying behaviour. This also often requires making a trade-off between how realistic a model should be in order to address the scientific questions of interest and the computational tractability of the model.
View Article and Find Full Text PDF