Results 171 to 180 of about 62,210 (284)

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

CYBER ATTACKS DETECTION IN INFORMATION NETWORKS

open access: yesINFORMATICS AND MATHEMATICAL METHODS IN SIMULATION, 2020
I.R. Opirsky, Y.M. Tkach, V.O. Khoroshko
openaire   +1 more source

Paris Olympics and Paralympics: Insights from nationwide coordination in preparedness, supply chain management and blood inventory

open access: yesVox Sanguinis, EarlyView.
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert   +9 more
wiley   +1 more source

IoT Botnet Cyber Attack Detection

open access: yesIJARCCE, 2023
Kajal Sawant   +3 more
openaire   +1 more source

Sharing conspiracy theories and staying in power: How leaders' false theories influence leadership perception

open access: yesBritish Journal of Social Psychology, Volume 65, Issue 3, July 2026.
Abstract Research shows that spreading conspiracy theories impacts leaders' reputations; yet, it remains unclear how leaders are viewed when their theories are debunked. Across four studies (N = 1437), we explored whether conveying a conspiracy theory, regardless of its accuracy, influences followers' impressions of leader dominance, competence and ...
Shen Cao   +2 more
wiley   +1 more source

CYBER ATTACKS ON INTRUSION DETECTION SYSTEM

open access: yes
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
openaire   +1 more source

Cyber-attack Detection and Isolation

open access: yesInternational Journal of Advanced Engineering and Management Research
Chetanpal Singh, Rahul Thakkar
openaire   +1 more source

Home - About - Disclaimer - Privacy