Cyberbullying roles and psychosocial dynamics: a latent profile analysis of loneliness, resilience, and self-regulation in adolescents. [PDF]
Yazıcı-Kabadayı S +2 more
europepmc +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Trend Factor Smoothing and Tasmanian Devil Optimization based Siamese Neural Network for anomaly detection in predictive maintenance. [PDF]
Hector I, Panjanathan R.
europepmc +1 more source
Meta Reinforcement Learning for Automated Cyber Defence
ABSTRACT Reinforcement learning (RL) solutions have shown considerable promise for automating the defense of networks to cyber attacks. However, a limitation to their real world deployment is the sample efficiency and generalizability of RL agents. This means that even small changes to attack types require a new agent to be trained from scratch.
Andrew Thomas, Nick Tillyer
wiley +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
Multi‐Agent Reinforcement Learning for Cyber Defence Transferability and Scalability
A method for using mutli‐agent reinforcement learning that allows for zero shot transfer across network setups. Diagrams show the local observation construction, training and agent mapping process. The results for novel 15 and 30 node networks show effective transfer and improved scaling performance. ABSTRACT Reinforcement learning (RL) has shown to be
Andrew Thomas +2 more
wiley +1 more source
Hierarchical deep Q-network-based optimization of resilient grids under multi-dimensional uncertainties from extreme weather. [PDF]
Dong S +6 more
europepmc +1 more source
Unlocking IIoT Potential with AI. ABSTRACT Artificial Intelligence (AI) is playing an increasingly vital role in the Industrial Internet of Things (IIoT), enabling predictive analytics, real‐time monitoring, and autonomous operations across industries such as manufacturing, logistics, and energy.
Tinashe Magara, Mampilo Phahlane
wiley +1 more source
A Simulation Study on the Theoretical Potential of Quantum-Enhanced Federated Security Operations. [PDF]
Campbell R.
europepmc +1 more source
Crossing the third‐level digital divide through digital literacy programs
Abstract Digital literacy programs (DLPs) implemented by community‐anchored organizations have become a key focus toward achieving digital equity. However, there is a notable lack of quantitative empirical research that measures DLPs' effectiveness in supporting the achievement of tangible benefits of digital literacy (DL), beyond simply acquiring it ...
Yeweon Kim +2 more
wiley +1 more source

