Results 191 to 200 of about 8,269 (263)
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
Windows-APT 2025: A dataset for APT-inspired attack scenarios on windows systems. [PDF]
Mozaffari M +2 more
europepmc +1 more source
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley +1 more source
Cybersecurity in connected medical devices: a policy agenda for the NHS. [PDF]
Toparti O, Rajput K, Darzi A, Ghafur S.
europepmc +1 more source
ABSTRACT Contemporary societies face slow‐burning crises – such as antimicrobial resistance (AMR) – that demand sustained responses from national governments but often elicit uneven action. Policy implementation, public health, and creeping crisis literatures have each proposed factors to explain why governments vary in their responses.
Nicholas Olczak, Mark Rhinard
wiley +1 more source
Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber-Physical Systems. [PDF]
Wang Z, Zhang S, Jiang Y, Yin C.
europepmc +1 more source
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen +4 more
wiley +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
Cyber-resilient machine learning framework for accurate individual load forecasting and anomaly detection in smart grids. [PDF]
Tayseer M +8 more
europepmc +1 more source

