Results 171 to 180 of about 62,210 (284)
Personalized Model‐Driven Interventions for Decisions From Experience
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford +6 more
wiley +1 more source
CYBER ATTACKS DETECTION IN INFORMATION NETWORKS
I.R. Opirsky, Y.M. Tkach, V.O. Khoroshko
openaire +1 more source
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert +9 more
wiley +1 more source
Artificial intelligence driven multi agent framework for adaptive cyber attack simulation and automated incident response in cyber range environments. [PDF]
Agrawal A +3 more
europepmc +1 more source
Abstract Research shows that spreading conspiracy theories impacts leaders' reputations; yet, it remains unclear how leaders are viewed when their theories are debunked. Across four studies (N = 1437), we explored whether conveying a conspiracy theory, regardless of its accuracy, influences followers' impressions of leader dominance, competence and ...
Shen Cao +2 more
wiley +1 more source
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
openaire +1 more source
Football cybersecurity threat severity prediction using multi-head transformer-based deep learning models. [PDF]
Hassan BM +5 more
europepmc +1 more source
Cyber-attack Detection and Isolation
Chetanpal Singh, Rahul Thakkar
openaire +1 more source

