Results 201 to 210 of about 144,780 (287)
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert +9 more
wiley +1 more source
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. [PDF]
Abbas S +6 more
europepmc +1 more source
Abstract Recent events have highlighted the urgent need for comprehensive blood preparedness plans at local, regional, national and cross‐border levels within the Nordic countries. This article outlines the perspectives and strategies related to blood preparedness in Norway, Sweden and Finland, in the context of emergencies, disasters and armed ...
Agneta Wikman +8 more
wiley +1 more source
CYBER ATTACKS AS A FORM OF CYBER TERRORISM
openaire +1 more source
Abstract Research shows that spreading conspiracy theories impacts leaders' reputations; yet, it remains unclear how leaders are viewed when their theories are debunked. Across four studies (N = 1437), we explored whether conveying a conspiracy theory, regardless of its accuracy, influences followers' impressions of leader dominance, competence and ...
Shen Cao +2 more
wiley +1 more source
Cardiac devices and cyber attacks: How far are they real? How to overcome? [PDF]
Kapoor A, Vora A, Yadav R.
europepmc +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source
On Using the Shapley Value for Anomaly Localization: A Statistical Investigation
ABSTRACT Recent publications have suggested using the Shapley value for anomaly localization for sensor data systems. We use a reasonable statistical model for the classifiers required to compute the Shapley value to provide repeatable and rigorous analysis in the anomaly localization application.
Rick S. Blum +2 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source

