Results 41 to 50 of about 2,054,840 (293)
YOLOAL: Focusing on the Object Location for Detection on Drone Imagery
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen +4 more
doaj +1 more source
Attribution of Cyber Attacks on Industrial Control Systems [PDF]
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on ...
Allan Cook +4 more
doaj +1 more source
In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-based
M. Ferrag +4 more
semanticscholar +1 more source
Кибербезопасность в образовательных сетях [PDF]
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr +7 more
core +1 more source
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform.
Naveen Tatipatri, S. L. Arun
semanticscholar +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj
The entire world has been impacted by Covid-19, which has forced the nations to undergo lockdowns, which have opened the new horizons of virtual learning and work from home culture.
Niteesh Kumar Upadhyay, Mahak Rathee
semanticscholar +1 more source
A comprehensive review of cyber-physical security risks in new power system
This review systematically examines the multifaceted cyber-physical security risks facing new power systems during the global energy transition, with a focus on three critical dimensions.
Huang Huihui +4 more
doaj +1 more source
Memory access integrity: detecting fine-grained memory access errors in binary code
As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important software systems written in memory unsafe languages like C/C++. Plenty of work have been proposed
Wenjie Li +7 more
doaj +1 more source
AI hype as a cyber security risk: the moral responsibility of implementing generative AI in business
This paper examines the ethical obligations companies have when implementing generative Artificial Intelligence (AI). We point to the potential cyber security risks companies are exposed to when rushing to adopt generative AI solutions or buying into “AI
Declan Humphreys +3 more
semanticscholar +1 more source

