ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
AI-based intelligent sensing detection of cybersecurity threats using multimodal sensor data in smart devices. [PDF]
Latif M +6 more
europepmc +1 more source
A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley +1 more source
Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]
Abdulganiyu OH +6 more
europepmc +1 more source
Read the free Plain Language Summary for this article on the Journal blog. Abstract Plant phenology is crucial for understanding plant growth and climate feedback. It affects canopy structure, surface albedo, and carbon and water fluxes. While the influence of environmental factors on phenology is well‐documented, the role of plant intrinsic factors ...
Yunpeng Luo +8 more
wiley +1 more source
Two-Tier heuristic search for ransomware-as-a-service based cyberattack défense analysis using explainable Bayesian deep learning model. [PDF]
Almuflih AS.
europepmc +1 more source
Tree‐based modelling of ecosystem services and climate‐adaptive silviculture strategies
Our years‐long collaboration contributed to a robust scientific basis for the next TVSF management plan, which is currently under development. More broadly, our findings demonstrate the adaptive capacity of communities in sparsely managed climate vulnerable forests is likely insufficient to offset declines in desired ecosystem services.
Shelby Sundquist +3 more
wiley +1 more source
Towards Optimal Sensor Placement for Cybersecurity: An Extensible Model for Defensive Cybersecurity Sensor Placement Evaluation. [PDF]
Wagner N, Damodaran SK, Reavey M.
europepmc +1 more source
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant +3 more
wiley +1 more source
FalsEye: proactive detection of false data injection attacks in smart grids using IceCube-optimised ensemble learning. [PDF]
Sheta AN +4 more
europepmc +1 more source

