Results 51 to 60 of about 111,415 (271)

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Advancing Sustainable Development in Manufacturing: A Strategic Framework for Overcoming Green–Lean Implementation Barriers

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Manufacturing's transition to sustainable development depends on integrating green with lean under credible environmental policy and stakeholder engagement. Although benefits are well established, the literature underspecifies implementation barriers and their prioritisation. This study identifies, structures, and prioritises barriers to green–
Jose Arturo Garza‐Reyes   +4 more
wiley   +1 more source

MAP-GAN: multi-attribute facial privacy protection model without losing identification

open access: yesCybersecurity
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang   +5 more
doaj   +1 more source

Cultivating Circularity: Harnessing Industry 4.0 and Stakeholder Engagement for a Sustainable Agrifood Future in Brazil

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem   +3 more
wiley   +1 more source

Log Analyzer To Detect Malicious Attacks Based On Pattern Matching [PDF]

open access: yesITM Web of Conferences
The Log Analyzer scan through the system logs and search for patterns found in particular cyber threat and come to conclusion whether a system is infiltrated and data is being breached, given if the patterns of cyber threat match with the system logs and
Murthy N. N. A. G. Sadasiva   +3 more
doaj   +1 more source

A Taxonomy of Predictive Maintenance as a Basis for Supra‐Regional Sustainability Monitoring—Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The concept of predictive maintenance in advanced manufacturing systems is crucial from the point of view of resource efficiency in the era of high competitiveness forced by energy transformation in the digital economy. Against the backdrop of sustainability and the opportunities a data cooperative offers, the combination of predictive ...
Christian Schachtner   +6 more
wiley   +1 more source

Fast Payments Across Heterogeneous Blockchains for Internet of Things

open access: yesIEEE Access
Internet of Things data exchange services facilitate the connection and flexible exchange of data among distributed IoT data sources. Traditional IoT data exchange services typically involve direct data uploads to the cloud, allowing service providers to
Zhikai Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy