Results 141 to 150 of about 121,838 (272)
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. [PDF]
Nayak J +4 more
europepmc +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. [PDF]
Albasheer H +8 more
europepmc +1 more source
Markov Determinantal Point Process for Dynamic Random Sets
ABSTRACT The Law of Determinantal Point Process (LDPP) is a flexible parametric family of distributions over random sets defined on a finite state space, or equivalently over multivariate binary variables. The aim of this paper is to introduce Markov processes of random sets within the LDPP framework. We show that, when the pairwise distribution of two
Christian Gouriéroux, Yang Lu
wiley +1 more source
ABSTRACT With the advent of the Internet of Things, it is increasingly common to have large networks of sensors, where each sensor may collect different types of data, has limited local computing resources and the ability to transmit data to a central cloud. Detecting events that trigger changes in sensor data properties is a key concern.
Ziyang Yang +2 more
wiley +1 more source
Perioperative pandemic protocols are also useful during a cyber-attack system downtime. [PDF]
Fremming BA +5 more
europepmc +1 more source
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
ADS-B Crowd-Sensor Network and Two-Step Kalman Filter for GNSS and ADS-B Cyber-Attack Detection. [PDF]
Leonardi M, Sirbu G.
europepmc +1 more source

