Results 121 to 130 of about 61,083 (243)

ROSPaCe: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System and IoT Networks

open access: yesScientific Data
Most of the intrusion detection datasets to research machine learning-based intrusion detection systems (IDSs) are devoted to cyber-only systems, and they typically collect data from one architectural layer.
Tommaso Puccetti   +4 more
doaj   +1 more source

System level network data and models attack cancer drug resistance

open access: yesBritish Journal of Pharmacology, EarlyView.
Drug resistance is responsible for >90% of cancer related deaths. Cancer drug resistance is a system level network phenomenon covering the entire cell. Small‐scale interactomes and signalling network models of drug resistance guide directed drug development.
Márk Kerestély   +6 more
wiley   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

When Is a Boundary Not a Boundary? Exploring the Tensions and Potentialities of Creative Practice in Doctoral Research in Art and Design Education

open access: yesInternational Journal of Art &Design Education, EarlyView.
Abstract Alongside their continuing growth in the popularity, both practice research in creative disciplines and arts‐based methods in research in the social sciences have histories now spanning several decades. In doctoral education, art and design education research sits within and across two distinct fields – the art and design doctorate and the ...
Sian Vaughan
wiley   +1 more source

How and Why EU Institutions Promote the Digital Euro: The Politics of a Central Bank Digital Currency (CBDC)

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley   +1 more source

Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley   +1 more source

Do robots boost productivity? A quantitative meta‐study

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT This meta‐study analyzes the productivity effects of industrial robots. More than 1800 estimates from 85 primary studies are collected. The meta‐analytic evidence suggests that robotization has so far provided, at best, a small boost to productivity. There is strong evidence of publication bias in the positive direction.
Florian Schneider
wiley   +1 more source

Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique

open access: yesAin Shams Engineering Journal
The DC-Microgrids (DC-MGs) are increasingly prone to various cyber-attacks due to the advancement of intelligent controlling, monitoring, operation methods.
Revathi Subramaniam   +2 more
doaj   +1 more source

Knowledge graph reasoning for cyber attack detection

open access: yesIET Communications
Abstract In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network ...
Ezekia Gilliard   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy