Results 101 to 110 of about 60,976 (288)

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors [PDF]

open access: yes, 2013
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use
DeLuca, Christopher D.
core   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Intrusion Detection Systems Using Adaptive Regression Splines [PDF]

open access: yes, 2003
Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems.
Abraham, Ajith   +3 more
core   +4 more sources

Fault‐Tolerant Fuzzy Boundary Control for Nonlinear Distributed Parameter Systems Under Limited Measurements and Markovian Failures

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li   +5 more
wiley   +1 more source

Cyber polygon — practice of protecting critical infrastructure objects and companies of aviation industry from cyber terrorist attacks — experience of ukraine and the world (review article)

open access: yesАрхів кримінології та судових наук
The article discusses development and implementation of a set of measures to ensure information and cyber terrorist security at critical infrastructure facilities and enterprises of the aerospace industry with the development of measures to counter ...
Oleksii Lytvynov   +3 more
doaj   +1 more source

Healthcare’s Biggest Cyber Attacks

open access: yesITNOW, 2023
Abstract Frank Plummer MBCS, cyber security consultant, explores the CIA triad – confidentiality, integrity and availability – and its impact on three recent cyber attacks in healthcare.
openaire   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Finding the thieves amongst the liars: Thinking clearly about cyber-enabled influence operations

open access: yesEuropean Journal of International Security
How do cyber attacks aid attempts to generate influence? This article argues that cyber-enabled influence operations (CEIO) are more varied in form than is often recognised by scholars.
Christopher Whyte, Ugochukwu Etudo
doaj   +1 more source

Home - About - Disclaimer - Privacy