A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source
ADS-B Crowd-Sensor Network and Two-Step Kalman Filter for GNSS and ADS-B Cyber-Attack Detection. [PDF]
Leonardi M, Sirbu G.
europepmc +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Artificial intelligence driven multi agent framework for adaptive cyber attack simulation and automated incident response in cyber range environments. [PDF]
Agrawal A +3 more
europepmc +1 more source
Markov Determinantal Point Process for Dynamic Random Sets
ABSTRACT The Law of Determinantal Point Process (LDPP) is a flexible parametric family of distributions over random sets defined on a finite state space, or equivalently over multivariate binary variables. The aim of this paper is to introduce Markov processes of random sets within the LDPP framework. We show that, when the pairwise distribution of two
Christian Gouriéroux, Yang Lu
wiley +1 more source
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Weighted average algorithm adjusted a novel (1 + FOPI)-FOPI-TID controller structure for AGC with integration of non-linearities and cyber-attack. [PDF]
Awal M +4 more
europepmc +1 more source
Cyber-attack group analysis method based on association of cyber-attack information
Kyungho Son +2 more
openaire +1 more source

