Results 61 to 70 of about 74,403 (290)
ABSTRACT The concept of predictive maintenance in advanced manufacturing systems is crucial from the point of view of resource efficiency in the era of high competitiveness forced by energy transformation in the digital economy. Against the backdrop of sustainability and the opportunities a data cooperative offers, the combination of predictive ...
Christian Schachtner +6 more
wiley +1 more source
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance
Cyber resilience is a topic of extreme relevance to organizations in the most diverse segments of activity, where the concept of resilience presents nuance in its different dimensions, in addition to the need to recognize and distinguish the different ...
Misael Sousa de Araujo +2 more
doaj +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source
Securing cloud-native infrastructures that integrate Multi-Factor Authentication (MFA) via FIDO2, container orchestration with Kubernetes, and Dockerized microservices remains a complex challenge due to interdependent vulnerabilities and escalating ...
Mohammad Hafiz Hersyah +4 more
doaj +1 more source
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza +2 more
wiley +1 more source
Empowering protest through social media [PDF]
Advances in personal communications devices including smartphones, are enabling individuals to establish and form virtual communities in cyberspace. Such platforms now allow users to be in continuous contact, enabling them to receive information in real ...
O\u27Rourke, Simon
core +1 more source
Weak Resilience of Networked Control Systems
In this paper, we propose a method to establish a networked control system that maintains its stability in the presence of certain undesirable incidents on local controllers. We call such networked control systems weakly resilient.
Besselink, Bart +5 more
core +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source

