Results 121 to 130 of about 111,415 (271)
Cyber security threats: A never-ending challenge for e-commerce. [PDF]
Liu X +6 more
europepmc +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
A New Image Encryption Method Using an Optimized Smart Codebook
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Named entity recognition model based on Multi‐BiLSTM and competition mechanism
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou +3 more
doaj +1 more source
Preschool Cyber Security Management System Based on Intelligent Agents. [PDF]
Song J.
europepmc +1 more source
The cyber security learning and research environment [PDF]
This report outlines the design and configuration of the Cyber Security Learning and Research Environment (CLARE). It explains how such a system can be implemented with minimal hardware either on a single machine or across multiple machines.
Bhardwaj, Julian
core
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
From ESG to Sustainable Development: A Path Designed for the Triple Helix Spheres
ABSTRACT This work examines the relationship between environmental, social, and governance (ESG) initiatives and sustainable development (SD), highlighting a scientific gap in their effective connection. It aims to propose a framework with recommendations for promoting SD through ESG, considering the governmental, business, and academic spheres from ...
Elen Cristina Bravos Giupponi +3 more
wiley +1 more source
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou +3 more
doaj +1 more source

