Results 181 to 190 of about 76,134 (287)
Knowledge Graphs and Critical Infrastructures: Friends or Foes?
Conceptual overview of Knowledge Graph integration in Critical Infrastructures, illustrating interconnected systems, data flows, and their role in enhancing resilience and operational intelligence. ABSTRACT Knowledge Graphs (KGs) are a natural evolution of data models representing and connecting data in a network of nodes and relations.
José Miguel Blanco +3 more
wiley +1 more source
An Integrated Cyber-Physical Digital Twin Architecture with Quantitative Feedback Theory Robust Control for NIS2-Aligned Industrial Robotics. [PDF]
Karlova-Sergieva V +2 more
europepmc +1 more source
ABSTRACT This study investigates the impact of digital transformation and emerging technologies, particularly generative artificial intelligence (GenAI), on the readiness and practices of crisis communication professionals in Hong Kong (HK). Despite growing theoretical advances, recent literature remains predominantly Western‐centric, with limited ...
Cindy Sing Bik Ngai +3 more
wiley +1 more source
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source
How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley +1 more source
Edge digital twin for coordinating flexible resources in distribution networks with communication constraints. [PDF]
Guo J +5 more
europepmc +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
ABSTRACT Users of child protection social work and/or their families are fully entitled to express their dissatisfaction with the professional or service through both formal and informal channels. Fair criticism and dissatisfaction can sometimes, however, escalate and cross the line into violence, harassment and abuse (VHA).
Amy Bradley +3 more
wiley +1 more source
Digital arrest in the cyber age: a psychological perspective on fear, authority, and consciousness. [PDF]
Robert SJ, Singh V, Pandey RP, Bhuyan B.
europepmc +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source

