Results 81 to 90 of about 61,083 (243)
Blockchain-oriented approach for detecting cyber-attack transactions
With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value. Financial security has become a top priority with
Zhiqi Feng, Yongli Li, Xiaochen Ma
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
This study demonstrates that ECOSTRESS lands surface temperature (LST) data are sensitive to forest thinning, regional drought, and their interaction. Consistent with high‐resolution UAV images, ECOSTRESS LST data indicate thinned forest had significantly greater temperature across years.
Temuulen Tsagaan Sankey +9 more
wiley +1 more source
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios [PDF]
Presently, attackers succeed to damage different cyber systems no matter whether cyber security solutions are implemented or not. This fact can be explained by the information insufficiency regarding the attack environment and the deployed solutions, in ...
Yosra Lakhdhar +2 more
doaj +3 more sources
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca +4 more
wiley +1 more source
Cyber Attack detection Using Big data analysis
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer networks and the myriad of recent content-based threats, which occur daily. As well as an overview of machine learning approaches for signature and anomaly detection methods, this article discusses several machine learning strategies applied to intrusion ...
Yazeed Al Moaiad +3 more
openaire +1 more source
Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray +7 more
wiley +1 more source
Cyber-physical power systems (CPPS), such as smart grids, are essential to modern infrastructure but are increasingly vulnerable to sophisticated cyber-attacks.
Shaharier Kabir +3 more
doaj +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source

