Results 111 to 120 of about 31,297 (287)

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Fault‐Tolerant Fuzzy Boundary Control for Nonlinear Distributed Parameter Systems Under Limited Measurements and Markovian Failures

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li   +5 more
wiley   +1 more source

CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?

open access: yesYeditepe Üniversitesi Hukuk Fakültesi Dergisi
While technological advances have encompassed every aspect of our daily lives and provided great advantages, cyberattacks have also become an increasingly critical concern, raising questions about their potential role in terrorism. This article examines the intersection of cyberattacks and terrorism, focusing on the potential of cyberterrorism as a new
openaire   +2 more sources

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study. [PDF]

open access: yesSensors (Basel), 2023
Zarzycki K   +7 more
europepmc   +1 more source

The State Itself as a Vulnerable Subject? Existential Resilience under International Law

open access: yesThe Modern Law Review, EarlyView.
This paper proposes a new framework for analysis of the law governing State continuity, with particular reference to Small Island Developing States (SIDS) threatened with legal extinction as a result of rising sea‐levels. Prevailing wisdom suggests that if States were to lose their inhabitable land or permanently resident populations, their status ...
Alex Green (文浩航)
wiley   +1 more source

Automatic Verification and Execution of Cyber Attack on IoT Devices. [PDF]

open access: yesSensors (Basel), 2023
Færøy FL, Yamin MM, Shukla A, Katt B.
europepmc   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Home - About - Disclaimer - Privacy