Sensor-Based Cyber Risk Management in Railway Infrastructure Under the NIS2 Directive. [PDF]
Wachnik R, Chruzik K, Pochopień B.
europepmc +1 more source
Export controls and the energy transition: Aligning security and sustainability
Abstract This article examines how the accelerating use of export controls, once motivated by narrow security interests, can now affect the pace and success of the global energy transition. As strategic rivalry intensifies among the US, the EU and China, export controls increasingly target access to critical and emerging technologies such as advanced ...
Olga Hrynkiv
wiley +1 more source
Terrorism, Perceived Threat, and Support for Surveillance: A Virtual Reality Experiment on Cyber vs. Conventional Terrorism. [PDF]
Snider KLG +5 more
europepmc +1 more source
Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley +1 more source
Pessimism or optimism? A tri-spatial analysis of public risk perception bias and its influencing mechanisms: evidence from 31 major cities in China. [PDF]
Wang L, Wang Y, Wu M.
europepmc +1 more source
Informal Firms' Adoption and Use of Mobile Money Under Uncertain Times: Evidence From Burkina Faso
ABSTRACT This paper investigates how uncertainty affects mobile money adoption and use by informal businesses. Despite the prevalence of the informal sector in developing countries and the recognized potential of mobile money for financial inclusion, empirical research on its adoption and usage among unregistered businesses is limited.
Serge Stéphane Ky, Clovis Rugemintwari
wiley +1 more source
Orchestrating machine learning models in a swarm architecture for IoT inline malware detection. [PDF]
Hanif M +5 more
europepmc +1 more source
SecuFL-IoT: an adaptive privacy-preserving federated learning framework for anomaly detection in smart industrial networks. [PDF]
Alqazzaz A.
europepmc +1 more source
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source

