Filter options

Publication Date
From
to
Subjects
Journals
Article Types
Countries / Territories
Open Access January 10, 2025

Artificial Immune Systems: A Bio-Inspired Paradigm for Computational Intelligence

Abstract Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and immune memory. These systems have demonstrated significant potential in addressing complex challenges across optimization, anomaly detection, and adaptive system control. This paper provides a [...] Read more.
Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and immune memory. These systems have demonstrated significant potential in addressing complex challenges across optimization, anomaly detection, and adaptive system control. This paper provides a comprehensive exploration of AIS applications in domains such as cybersecurity, resource allocation, and autonomous systems, highlighting the growing importance of hybrid AIS models. Recent advancements, including integrations with machine learning, quantum computing, and bioinformatics, are discussed as solutions to scalability, high-dimensional data processing, and efficiency challenges. Core algorithms, such as the Negative Selection Algorithm (NSA) and Clonal Selection Algorithm (CSA), are examined, along with limitations in interpretability and compatibility with emerging AI paradigms. The paper concludes by proposing future research directions, emphasizing scalable hybrid frameworks, quantum-inspired approaches, and real-time adaptive systems, underscoring AIS's transformative potential across diverse computational fields.
Figures
PreviousNext
Article
Open Access December 22, 2023

Cloud Based Payment Processing and Merchant Services: A Scalable and Secure Framework for Digital Transactions in a Globalized Economy

Abstract In today’s world of a globalized economy and ubiquitous digital transactions, businesses are hungry for ways to increase transaction efficiency and security. In the real economy, solutions that scale to fit transaction volume or velocity are equally valuable. This is true for clearing and settlement and for the day-to-day needs of buyers and sellers alike. Clever observers of both cash and digital [...] Read more.
In today’s world of a globalized economy and ubiquitous digital transactions, businesses are hungry for ways to increase transaction efficiency and security. In the real economy, solutions that scale to fit transaction volume or velocity are equally valuable. This is true for clearing and settlement and for the day-to-day needs of buyers and sellers alike. Clever observers of both cash and digital transactions can spot cases where technology that supports transaction security or safety can strengthen consumer-borrower ties, mitigate default risks, and reduce recidivism. In general, a cloud solution for payment processing and merchant services solves two major barriers to optimum business technology: lack of scalability and lack of security [1]. The extension of current practice has its advantages, but new solutions unlock significant opportunities for both consumers and financial institutions [2]. The focus of this work is on the provisioning of cloud-based payment processing and merchant services to financial institutions and established global organizations, although the options available with these services mean they are potentially applicable to a wide range of group entities, including non-trading organizations, pension administrators, and group treasurers. With the increased attention to cybersecurity, a mass of data is available to assist the IT departments of the major payment processors, merchants, and acquirers to get cybersecurity on the radar of C-level executives [3]. The case is put forward for the increased targeting of and reporting to the Board’s Audit, Risk, and Liability Committees of publicly held payment processors and merchants to reduce fraud losses and mitigate the reputation and class action lawsuit risk due to data breaches. The progress of technology in the payment sector requires all stakeholders to have a collective approach in order to mitigate fraud and cybersecurity-related risks in new products and services to enhance consumer confidence and the proportion of retail cashless transactions [4].
Figures
PreviousNext
Review Article
Open Access February 26, 2025

Innovations and Challenges in Pharmaceutical Supply Chain, Serialization and Regulatory Landscape

Abstract The pharmaceutical supply chain has become increasingly complex and vulnerable to various risks, including counterfeit drugs, diversion, and fraud. As these challenges threaten patient safety and the integrity of global healthcare systems, serialization has emerged as a pivotal innovation in pharmaceutical logistics and regulatory compliance. Serialization involves assigning unique identifiers to [...] Read more.
The pharmaceutical supply chain has become increasingly complex and vulnerable to various risks, including counterfeit drugs, diversion, and fraud. As these challenges threaten patient safety and the integrity of global healthcare systems, serialization has emerged as a pivotal innovation in pharmaceutical logistics and regulatory compliance. Serialization involves assigning unique identifiers to individual drug packages, enabling precise tracking and authentication at every stage of the supply chain. This process provides unprecedented transparency, enhances product security, and facilitates real-time monitoring of pharmaceutical products as they move from manufacturers to end consumers. Despite its potential to revolutionize pharmaceutical traceability, the integration of serialization technologies faces numerous obstacles. These include high implementation costs, regulatory inconsistencies across regions, and the technological challenges of managing vast amounts of data. Moreover, the complex, multi-tiered nature of the global supply chain introduces additional risks related to data integrity, cybersecurity, and interoperability between systems. As pharmaceutical companies seek to navigate these challenges, innovations in serialization technology—such as blockchain, artificial intelligence (AI), the Internet of Things (IoT), and radio frequency identification (RFID)—are providing promising solutions to enhance efficiency, reduce fraud, and increase visibility. This manuscript explores both the innovative advancements and the key challenges associated with the integration of serialization in the pharmaceutical supply chain. It delves into the evolving regulatory landscape, highlighting the need for global harmonization of serialization standards, and examines the impact of serialization on securing pharmaceutical distribution networks. Additionally, the paper emphasizes the importance of collaboration among manufacturers, technology providers, and regulatory bodies in overcoming implementation barriers and realizing the full potential of serialization. As the pharmaceutical industry moves towards a more interconnected and data-driven future, serialization promises to play a central role in shaping the next generation of drug safety and supply chain management. By addressing the hurdles to adoption and leveraging emerging technologies, the pharmaceutical sector can create a more secure, transparent, and efficient supply chain that better serves public health and fosters greater trust among consumers and healthcare professionals alike.
Review Article
Open Access December 06, 2023

Success Factors of Adopting Cloud Enterprise Resource Planning

Abstract The technologies for cloud ERP (Enterprise Resource Planning) have revolutionized the field of information technologies. Any kind of business can benefit from their flexibility, affordability, scalability, adaptation, availability, and customizable data. An advancement of classic ERP, cloud enterprise resource planning (C-ERP) provides the benefits of cloud computing (CC), including resource [...] Read more.
The technologies for cloud ERP (Enterprise Resource Planning) have revolutionized the field of information technologies. Any kind of business can benefit from their flexibility, affordability, scalability, adaptation, availability, and customizable data. An advancement of classic ERP, cloud enterprise resource planning (C-ERP) provides the benefits of cloud computing (CC), including resource elasticity and ease of use. The rise of cloud computing affects on-premise ERP systems in terms of architecture and cost. Cloud-based ERP systems make the claim to be appropriate for digital corporate settings. System quality, security, vendor lock-in, and data accessibility are recognized as the technological issues. Industry 4.0 refers to the re-engineering and revitalization of modern factories through the integration of cloud-based operations, industrial internet connectivity, additive manufacturing, and cybersecurity platforms. One of the four main pillars of Industry 4.0, cloud-based Enterprise Resource Planning (Cloud ERP), is a component of cloud operations that aids in achieving greater standards of sustainable performance.
Figures
PreviousNext
Review Article
Open Access October 15, 2022

Big Data and AI/ML in Threat Detection: A New Era of Cybersecurity

Abstract The unrelenting proliferation of data, entwined with the prevalence of mobile devices, has given birth to an unprecedented growth of information obscured by noise. With the Internet of Things and myriad endpoint devices generating vast volumes of sensitive and critical data, organizations are tasked with extracting actionable intelligence from this deluge. Governments and enterprises alike, even [...] Read more.
The unrelenting proliferation of data, entwined with the prevalence of mobile devices, has given birth to an unprecedented growth of information obscured by noise. With the Internet of Things and myriad endpoint devices generating vast volumes of sensitive and critical data, organizations are tasked with extracting actionable intelligence from this deluge. Governments and enterprises alike, even under pressure from regulatory boards, have strived to harness the power of data and leverage it to enhance safety and security, maximize performance, and mitigate risks. However, the adversaries themselves have capitalized on the unequal battle of big data and artificial intelligence to inflict widespread chaos. Therefore, the demand for big data analytics and AI/ML for high-fidelity intelligence, surveillance, and reconnaissance is at its highest. Today, in the cybersecurity realm, the detection of adverse incidents poses substantial challenges due to the sheer variety, volume, and velocity of deep packet inspection data. State-of-the-art detection techniques have fallen short of detecting the latest attacks after a big data breach incident. On the other hand, computational intelligence techniques such as machine learning have reignited the search for solutions for diverse monitoring problems. Recent advancements in AI/ML frameworks have the potential to analyze IoT/edge-generated big data in near real-time and assist risk assessment and mitigation through automated threat detection and modeling in the big data and AI/ML domain. Industry best practices and case studies are examined that endeavor to showcase how big data coupled with AI/ML unlocks new dimensions and capabilities in improved vigilance and monitoring, prediction of adverse incidents, intelligent modeling, and future uncertainty quantification by data resampling correction. All of these avenues lead to enhanced robustness, security, safety, and performance of industrial processes, computing, and infrastructures. A view of the future and how the potential threats due to the misuse of new technologies from bandwidth to IoT/edge, blockchain, AI, quantum, and autonomous fields is discussed. Cybersecurity is again playing out at a pace set by adversaries with low entry barriers and debilitating tools. The need for innovative solutions for defense from the emerging threat landscape, harnessing the power of new technologies and collaboration, is emphasized.
Figures
PreviousNext
Article
Open Access December 29, 2020

A Deep Learning Architectures for Enhancing Cyber Security Protocols in Big Data Integrated ERP Systems

Abstract Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectures of variational autoencoder, sparse autoencoder, and deep belief network for detecting anomalies, fraud, and preventing cybersecurity attacks. These cybersecurity issues occur in finance, human [...] Read more.
Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectures of variational autoencoder, sparse autoencoder, and deep belief network for detecting anomalies, fraud, and preventing cybersecurity attacks. These cybersecurity issues occur in finance, human resources, supply chain, and marketing in the big data integrated ERP systems or cloud-based ERP systems. The main objectives of this creative research work are to identify the vulnerabilities in various ERP systems, databases, and the interconnected domains; to introduce a conceptual cybersecurity network model that incorporates variational autoencoders, sparse autoencoders, and deep belief networks; to evaluate the performance of the proposed cybersecurity model by employing the appropriate parameters with real-time and synthetic databases and simulated scenarios; and to validate the model performance by comparing it with traditional algorithms. A big data platform with an integrated business management system is known as an integrated ERP system, which plays an instrumental role in conducting business for various organizations in society. In recent times, as uncertainty and disparity increase, the cyber ecosystem becomes more complex, volatile, dynamic, and unpredictable. In particular, the number of cyber-attacks is increasing at an alarming rate; the resultant security breaches have a disruptive and disturbing effect on businesses around the world, with a loss of billions of dollars. To combat these threats, it is essential to develop a conceptual cybersecurity network model to secure systems by functioning as a mutually supporting and strengthening network model rather than working in isolation. In this dynamic and fluid environment, introducing a deep learning approach helps to support and prevent fraud and other illicit activities related to human resources and the supply chain, among others. Some cybersecurity vulnerabilities include, for example, database vulnerabilities, service level vulnerabilities, and system vulnerabilities, among others. The proposed methodology focuses only on database vulnerabilities, with the main aim of detecting and mitigating new potential vulnerabilities in other dependent domains as a future initiative.
Figures
PreviousNext
Review Article
Open Access December 27, 2019

A Comprehensive Study of Proactive Cybersecurity Models in Cloud-Driven Retail Technology Architectures

Abstract This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail environment creates a need for more comprehensive and proactive security technologies that protect both the psychological estate and fiscal estate. This work contributes to cloud-driven retail research [...] Read more.
This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail environment creates a need for more comprehensive and proactive security technologies that protect both the psychological estate and fiscal estate. This work contributes to cloud-driven retail research by investigating anticipatory security technologies across numerous case studies. These case studies offer best practice models for elevating proactive cybersecurity in retail environments. The academic and professional communities currently lack security information and practices that apply to the retail environment. It is anticipated that the final results of this project will have value in shaping the next set of research in cybersecurity in retail environments. Many retail organizations are restricted to reactive security operations. Advanced security technologies operate on piloted activations that require the intervention of security analysts. In actuality, basic security products and security operations are now piloted by automation and machine learning. In one case study, a retail CTO shares a forensics example using a proactive security technology aimed at both psychological estate and fiscal estate. In another case study, direct discussions provide a retail university lecturer with insight into the use of driven intelligence for inventory management. The use of card technology for a model is used as an example that can be implemented as security technology which can be offered as a service to retail organizations.
Figures
PreviousNext
Review Article

Query parameters

Keyword:  cybersecurity

View options

Citations of

Views of

Downloads of