Results 81 to 90 of about 61,083 (243)

Blockchain-oriented approach for detecting cyber-attack transactions

open access: yesFinancial Innovation, 2023
With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value. Financial security has become a top priority with
Zhiqi Feng, Yongli Li, Xiaochen Ma
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

ECOSTRESS‐derived semi‐arid forest temperature and evapotranspiration estimates demonstrate drought and thinning impacts

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
This study demonstrates that ECOSTRESS lands surface temperature (LST) data are sensitive to forest thinning, regional drought, and their interaction. Consistent with high‐resolution UAV images, ECOSTRESS LST data indicate thinned forest had significantly greater temperature across years.
Temuulen Tsagaan Sankey   +9 more
wiley   +1 more source

A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios [PDF]

open access: yesJournal of Universal Computer Science, 2019
Presently, attackers succeed to damage different cyber systems no matter whether cyber security solutions are implemented or not. This fact can be explained by the information insufficiency regarding the attack environment and the deployed solutions, in ...
Yosra Lakhdhar   +2 more
doaj   +3 more sources

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Digital Futures, Sustainable Outcomes: Mapping the Impact of Digital Transformation on EU SDG Progress

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca   +4 more
wiley   +1 more source

Cyber Attack detection Using Big data analysis

open access: yes, 2022
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer networks and the myriad of recent content-based threats, which occur daily. As well as an overview of machine learning approaches for signature and anomaly detection methods, this article discusses several machine learning strategies applied to intrusion ...
Yazeed Al Moaiad   +3 more
openaire   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Proactive detection of cyber-physical grid attacks: A pre-attack phase identification and analysis using anomaly-based machine learning models

open access: yesArray
Cyber-physical power systems (CPPS), such as smart grids, are essential to modern infrastructure but are increasingly vulnerable to sophisticated cyber-attacks.
Shaharier Kabir   +3 more
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy