Results 191 to 200 of about 141,441 (275)

Modelling Cyber Attacks

open access: yesInternational Journal of Network Security & Its Applications, 2017
Farida Chowdhury, Md Sadek Ferdous
openaire   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Deciphering the Interplay Between Wetting and Chemo‐Mechanical Fracture in Lithium‐Ion Battery Cathode Materials

open access: yesAdvanced Functional Materials, Volume 36, Issue 11, 5 February 2026.
The fundamental intricate couplings between electrolyte wetting and fracture evolution are investigated in large single‐crystal V2O5 samples using both experimental techniques and simulations. Both approaches reveal consistent fracture patterns and lithium distribution concentration maps influenced by the wetting mechanism.
Wan‐Xin Chen   +6 more
wiley   +1 more source

Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. [PDF]

open access: yesPeerJ Comput Sci
Abbas S   +6 more
europepmc   +1 more source

When cyber-attack becomes cyber war

open access: yes, 2018
Tematska konferencija o kibernetičkoj ...
openaire   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Digital Agriculture: Past, Present, and Future

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 1, February 2026.
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy