Results 191 to 200 of about 5,299 (264)

Homicide, Suicide, Cyber-Victimization, and Cyber-Bullying in Persons with Internet Gaming Disorder. [PDF]

open access: yesIndian J Psychol Med
Kulkarni RR   +4 more
europepmc   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Selective Wettability–Driven Evaporation‐Enhanced Redox Cycling for Robust and Ultrasensitive Detection of Viral Particles

open access: yesSmall Methods, EarlyView.
ABSTRACT Timely detection of viral infections, particularly in settings outside centralized laboratories, is essential for controlling outbreaks. Small electrochemical biosensors are appealing because they are fast, require microliter sample volumes, and can be integrated into portable devices.
Pouya Soltan Khamsi   +3 more
wiley   +1 more source

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Metaverse and Artificial Intelligence as Web 4.0: The Next Generation of the Internet

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study utilizes systems thinking to explore and entwine an evolving metaverse scholarship to a relatively underexplored phenomenon of Web 4.0. We adopt a soft systems thinking framework to guide the interpretation of complex and evolving metaverse scholarship, using bibliometric mapping of 5587 publications sourced from Scopus.
Anton Klarin   +3 more
wiley   +1 more source

Addressing Complexity in System of Systems With GraphRAG: An AI‐Driven Framework for Dynamic Data Integration

open access: yesSystems Engineering, EarlyView.
ABSTRACT System of Systems (SoS) environments are inherently complex, involving numerous operationally and managerially independent component systems with hidden interdependencies and frequent interactions based on unstructured data. In this paper, we propose using graphical Retrieval‐Augmented Generation (GraphRAG), a tool that combines large language
Yinchien Huang   +2 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

A Bibliometric Review of the INCOSE's Model‐Based Systems Engineering Roadmap

open access: yesSystems Engineering, EarlyView.
ABSTRACT Over the past decade, model‐based systems engineering (MBSE) has gained attention as an approach for managing system complexity, offering a shift from a document‐based to a model‐based approach. The International Council on Systems Engineering (INCOSE) sparked increasing interest when it introduced MBSE and its roadmap as part of its systems ...
Marjolein Antoinette Jannyne Velthuizen   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy