Results 121 to 130 of about 161,956 (247)

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

A Review of Human–AI Synergy in Smart Energy Management Concepts, Functions, Applications, and Future Frontiers

open access: yesEnergy Internet, EarlyView.
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An   +5 more
wiley   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, EarlyView.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Trends in Smart Grid Cyber-Physical Security: Components, Threats, and Solutions

open access: yesIEEE Access
The increasing focus on cyber-physical security in Smart Grids (SGs) has catalyzed a surge in research over recent years. This paper comprehensively reviews SG cyber-physical security advancements, diverging from conventional studies that concentrate on ...
Dimitris M. Manias   +7 more
doaj   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Conceptualizing and measuring consumers’ negative attitudes towards online shopping

open access: yesBritish Journal of Management, EarlyView.
Abstract Despite the advantages of online shopping, increasing evidence indicates the prevalence of negative consumer attitudes towards online shopping (NATOS). Yet existing research exhibits a nearly exclusive focus on measuring positive attitudes, creating limited conceptual breadth. Moreover, despite the existence of conceptually related constructs (
Kaj‐Johanna Stichnoth   +1 more
wiley   +1 more source

Effects of chemical and biological warfare agent decontaminants on trace survival: Impact on fingermarks deposited on paper

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant   +3 more
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Technology for Whom and for What? A Global South View of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley   +1 more source

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Home - About - Disclaimer - Privacy