Results 121 to 130 of about 169,904 (225)
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
ABSTRACT The fashion supply chain is undergoing a transformation driven by AI, with significant implications for social sustainability and ethics. This study examines how AI‐powered innovations optimize supply chain operations, enhance transparency, and support ethical labor practices.
Guli‐Sanam Karimova +3 more
wiley +1 more source
Disclosure Benchmarking by Lawyers: Evidence From the IPO Setting
ABSTRACT Lawyers play an important advisory role in drafting financial reports, yet empirical evidence documenting the influence of external legal counsel on this process remains sparse. This study focuses on a specific aspect of lawyers’ drafting process: the practice of reviewing disclosures previously filed by other issuers—a practice termed ...
Michael Drake +4 more
wiley +1 more source
Towards understanding the applicability of runtime moving target defense for the internet of things and cyber physical systems. [PDF]
Gurung D, Pradhan MP, Gurung S.
europepmc +1 more source
Entropy-based byte patching transformer for self-supervised pretraining of SMILES data. [PDF]
Mswahili ME +5 more
europepmc +1 more source
A flow-level dataset of WireGuard tunnel traffic with matched encrypted-side features and application labels. [PDF]
Razooqi YS, Pekar A.
europepmc +1 more source
The MacWilliams Identity for the m-Spotty Weight Enumerators over ZpRk. [PDF]
Wang J, Jiang A, Solé P.
europepmc +1 more source
An image encryption scheme using PRESENT-RC4, chaos and secure key generation. [PDF]
Kumar K, Roy S, Puri D, Kumar R.
europepmc +1 more source

