Results 61 to 70 of about 31,297 (287)

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

D4I - Digital forensics framework for reviewing and investigating cyber attacks

open access: yesArray, 2020
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation.
Athanasios Dimitriadis   +3 more
doaj   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

A holistic and proactive approach to forecasting cyber threats

open access: yesScientific Reports, 2023
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures.
Zaid Almahmoud   +4 more
doaj   +1 more source

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

Cyber Physical Defense Framework for Distributed Smart Grid Applications

open access: yesFrontiers in Energy Research, 2021
Cyber-Physical Systems (CPS) is the amalgamation of highly sophisticated sensors with physical spaces. These close conjunctions of sensors with communication infrastructure intrinsically linking to society’s Critical Infrastructures (C.I.) are being ...
Ayush Sinha   +3 more
doaj   +1 more source

Digital Technology's Role in Circular Waste Management: A Systematic Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Combining circular economy ideas with digital tools offers a game‐changing way to tackle global sustainability problems. This paper focuses on how digital changes and circular economy models link up. A review has been conducted for 112 articles from 2021 to September 2025, using PRISMA‐2020 methodology. This study covered new tech like AI, IoT,
Reza Eslamipoor
wiley   +1 more source

On specification-based cyber-attack detection in smart grids

open access: yesEnergy Informatics, 2022
The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures.
Ömer Sen   +7 more
doaj   +1 more source

A novel approach for analyzing the nuclear supply chain cyber-attack surface

open access: yesNuclear Engineering and Technology, 2021
The nuclear supply chain attack surface is a large, complex network of interconnected stakeholders and activities. The global economy has widened and deepened the supply chain, resulting in larger numbers of geographically dispersed locations and ...
Shannon Eggers
doaj   +1 more source

Home - About - Disclaimer - Privacy