Results 51 to 60 of about 60,976 (288)

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation

open access: yesBaltic Journal of European studies, 2019
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts
Burton Joe
doaj   +1 more source

Cyber security and the unexplored threat to global health: a call for global norms

open access: yesGlobal Security: Health, Science and Policy, 2020
Cyber-attacks against hospitals, medical devices, and healthcare entities are becoming increasingly common; simultaneously, physical attacks against hospitals and healthcare entities are increasing. The purpose of this article is to explore the threat to
Rose Bernard   +2 more
doaj   +1 more source

USBcat - Towards an Intrusion Surveillance Toolset

open access: yes, 2014
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chapman, Chris, Dean, Tom, Knight, Scott
core   +2 more sources

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis

open access: yesIEEE Access, 2018
The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia.
Xiaoge Huang, Zhijun Qin, Hui Liu
doaj   +1 more source

New Wave Cyber Attacks

open access: yesInternational Conference on Cyber Warfare and Security, 2022
There is increasing enthusiasm for, and recognition of, the benefits that artificial intelligence (AI) can provide to society.  The emphasis has been on the positive, but AI and deep learning can be used for negative purposes. Modular Neural Networks (MNN) are capable of independent learning and have been targeted at evolutionary, complex financial ...
Angela Mison, Gareth Davies, Peter Eden
openaire   +2 more sources

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS [PDF]

open access: yesChallenges of the Knowledge Society, 2015
Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged.
Dan-Iulian VOITAŞEC
doaj  

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Home - About - Disclaimer - Privacy