Results 201 to 210 of about 60,976 (288)

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Magnetic Field‐Modulated Boolean Logic in Proteinoid‐ Fe3 O4 Hybrid Materials

open access: yesAdvanced Physics Research, Volume 5, Issue 5, May 2026.
Proteinoid‐Fe3O4${\rm Fe}_3{\rm O}_4$. nanoparticle composites exhibit spontaneous electrical oscillations that emulate Boolean logic gates (AND, OR, XOR, NAND, NOR, NOT) under magnetic field modulation. External fields of 65.103 mT tune oscillatory behavior: 84 mT enhances amplitude while 103 mT suppresses it.
Panagiotis Mougkogiannis   +1 more
wiley   +1 more source

Blood as a strategic resource: Lessons from Iwo Jima for civilian and military transfusion in large‐scale combat operations

open access: yes
Transfusion, EarlyView.
Evan Baines   +9 more
wiley   +1 more source

‘Crossing the Line’: Child Protection and Welfare Managers' and Social Workers' Experiences of Social Media, Online and Digital Abuse and Harassment in Ireland

open access: yesChild Abuse Review, Volume 35, Issue 3, May/June 2026.
ABSTRACT Users of child protection social work and/or their families are fully entitled to express their dissatisfaction with the professional or service through both formal and informal channels. Fair criticism and dissatisfaction can sometimes, however, escalate and cross the line into violence, harassment and abuse (VHA).
Amy Bradley   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy