Results 201 to 210 of about 31,297 (287)

Building centaur responders: is emergency management ready for artificial intelligence?

open access: yesDisasters, Volume 50, Issue 3, July 2026.
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte   +1 more
wiley   +1 more source

On Using the Shapley Value for Anomaly Localization: A Statistical Investigation

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
ABSTRACT Recent publications have suggested using the Shapley value for anomaly localization for sensor data systems. We use a reasonable statistical model for the classifiers required to compute the Shapley value to provide repeatable and rigorous analysis in the anomaly localization application.
Rick S. Blum   +2 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Artificial Intelligence in the Food Industry: Transforming Safety, Efficiency, and Sustainability From Farm to Fork

open access: yeseFood, Volume 7, Issue 3, June 2026.
This review synthesizes AI advancements in food systems, leveraging machine learning, computer vision, robotics, and IoT for 96%–100% accurate quality inspection, 30% reduced downtime, and enhanced traceability from farm to fork. It highlights transformative potential in sustainability and SDGs while addressing data, ethical, and scalability challenges
Muhammad Waqar   +9 more
wiley   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Survey on Cyber Attacks

open access: yesInternational Journal of Computer Applications, 2018
Davara Sagar   +4 more
openaire   +1 more source

Exploring the microfoundations of organizational risk exposure: Risk perception, risk management and cross‐level mechanisms

open access: yesJournal of Occupational and Organizational Psychology, Volume 99, Issue 2, June 2026.
Abstract Organizational risk exposure arises from external sources and internal activities intended to reduce the potential for risks to cause harm. While organizational risk exposure is necessary to realize opportunities, misalignment between risk management and risk exposure may achieve the opposite outcomes.
Emma Soane
wiley   +1 more source

Constructing Ionic Fast Diffusion Channels on LiNi0.5Mn1.5O4 for Lithium‐Ion Batteries

open access: yesAdvanced Functional Materials, Volume 36, Issue 39, 14 May 2026.
A dual‐modification strategy is developed for LNMO cathode, where bulk Ti doping stabilizes the oxygen framework and simultaneously drives the in situ formation of LaTi2O6 nano‐islands as ion diffusion channels on (111) surfaces, enabling high‐rate capacity (∼100 mAh g−1 at 30 C) and excellent cycling retention (87.8% after 1000 cycles).
Xinyi Zhang   +10 more
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy