You are currently viewing a new version of our website. To view the old version click .

Network, Volume 4, Issue 1

March 2024 - 6 articles

Cover Story: This paper delves into data protection challenges in automated decision-making systems using machine learning algorithms, emphasizing the need to balance algorithm accuracy with privacy and personal data protection. It discusses data protection issues, the related attacks due to insufficient legal defenses, and the relevance of GDPR compliance. Privacy-enhancing techniques, including differential privacy in deep learning algorithms, are explored through experiments illustrating the intricacies of simultaneously maintaining accuracy and privacy. This research highlights the delicate equilibrium required to uphold individuals' rights when utilizing deep learning algorithms for decision making. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (6)

  • Article
  • Open Access
1 Citations
3,793 Views
23 Pages

1 March 2024

Data protection issues stemming from the use of machine learning algorithms that are used in automated decision-making systems are discussed in this paper. More precisely, the main challenges in this area are presented, putting emphasis on how import...

  • Article
  • Open Access
6 Citations
4,849 Views
23 Pages

11 February 2024

An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analyzed and triaged by...

  • Article
  • Open Access
1 Citations
1,914 Views
20 Pages

7 February 2024

With the surge in cyber attacks, there is a pressing need for more robust network intrusion detection systems (IDSs). These IDSs perform at their best when they can monitor all the traffic coursing through the network, especially within a software-de...

  • Article
  • Open Access
3 Citations
3,753 Views
15 Pages

26 January 2024

With the ever-increasing advancement in blockchain technology, security is a significant concern when substantial investments are involved. This paper explores known smart contract exploits used in previous and current years. The purpose of this rese...

  • Review
  • Open Access
8 Citations
3,650 Views
32 Pages

15 January 2024

Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, heal...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Network - ISSN 2673-8732