TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security. [PDF]
Sahraoui Y +3 more
europepmc +1 more source
Organ‐specific terpenoid responses in Tanacetum vulgare are chemotype‐dependent
Common tansy varieties defend differently: some boost root chemicals against soil pests, while others release stronger leaf scents against aphids. Abstract Specialized metabolites such as terpenoids are known to mediate plant defence mechanisms. However, how terpenoid diversity governs inducible chemistry across organs remains poorly understood.
H. Newrzella +12 more
wiley +1 more source
A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning. [PDF]
Sinha P +5 more
europepmc +1 more source
Abstract Engagement in political conflict has been linked to various material and psychological motives, while the role of perceived collective injustice remains empirically contested. We examine this hypothesis for protest behavior in the West Bank.
Nils Mallock, Christian Krekel
wiley +1 more source
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture. [PDF]
Thilakarathne NN +3 more
europepmc +1 more source
The dangers, directness, and purposes of online collective actions
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery +2 more
wiley +1 more source
When Regulation Travels: Distrust and Disrespect
ABSTRACT Endeavoring to avoid the pitfalls of being too trusting of regulated entities' compliance claims, regulators sometimes create regulatory systems with elaborate requirements for verification. But as these accountability and verification regimes attempt to circumvent one set of problems, they may inadvertently create others.
Carol A. Heimer
wiley +1 more source
Enhancing cybersecurity through script development using machine and deep learning for advanced threat mitigation. [PDF]
Kim TH +5 more
europepmc +1 more source
Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks. [PDF]
B S, M S, K M, B L.
europepmc +1 more source

