MOVES Research & Education Systems Seminar: Presentation; Session 3c: Human Systems and Training (Operational Systems); Moderator: Mike McCauley; ROGUEVIDEO: CyberAttack; speaker: Erik ...
openaire +1 more source
An intelligent hybrid approach combining fuzzy C-means and the sperm whale algorithm for cyber attack detection in IoT networks. [PDF]
Elsedimy EI, AboHashish SMM.
europepmc +1 more source
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. [PDF]
Dutta V, Choraś M, Pawlicki M, Kozik R.
europepmc +1 more source
Futures of Everyday Life: A Qualitative Content Analysis of Future Personas in Scenarios
ABSTRACT Scenario reports, holding a long‐standing tradition in foresight and futures studies, act as an essential document for organizations to prepare for possible, plausible, and alternative futures. Focusing on descriptions and representations of everyday life, we examined 29 future persona narratives from six publications—covering a wide field ...
Gerhard Schönhofer +3 more
wiley +1 more source
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis. [PDF]
Delwar TS +7 more
europepmc +1 more source
How hospitals can protect themselves from cyber attack. [PDF]
Owens B.
europepmc +1 more source
An Overview of Deep Learning Techniques for Big Data IoT Applications
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur +2 more
wiley +1 more source
When all computers shut down: the clinical impact of a major cyber-attack on a general hospital. [PDF]
Abbou B +9 more
europepmc +1 more source
Smart Contracts and SME Resilience: Business Model Adaptation and International Considerations
ABSTRACT Smart contracts (SCs), appended to a blockchain, protect digital environments and their resources, processes and structures, reducing mismatches between legal and actual rights and ownership. They enhance digital resilience by improving transparency, traceability and trust in digital transactions.
Araz Zirar +2 more
wiley +1 more source

