Results 211 to 220 of about 60,976 (288)

Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. [PDF]

open access: yesPeerJ Comput Sci
Abbas S   +6 more
europepmc   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, Volume 33, Issue 3, Page 4070-4087, May 2026.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

The Relationship Between Premorbid Weight Status and Eating Disorder Onset in Adolescents: A Longitudinal Study

open access: yesInternational Journal of Eating Disorders, Volume 59, Issue 5, Page 940-951, May 2026.
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella   +5 more
wiley   +1 more source

An Explainable and Carbon‐Aware Stacked Ensemble Model for Phishing and Impersonation Detection in Online Social Networks

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat   +5 more
wiley   +1 more source

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation

open access: yesSystems Engineering, Volume 29, Issue 3, Page 425-443, May 2026.
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Home - About - Disclaimer - Privacy