Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core
Who Sexts? An Analysis of Psychological Predictors in Adolescents and Emerging Adults
ABSTRACT Introduction Sexting has become a common practice among adolescents and young adults. Certain psychological variables influence behavioral patterns, in turn increasing, in some cases, negative consequences. In other sexual behaviors, variables such as impulsivity, self‐esteem or romantic love myths have been associated with behavioral patterns
Cristina Giménez‐García +5 more
wiley +1 more source
Features requirement elicitation process for designing a chatbot application
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari +4 more
wiley +1 more source
Deep Recurrent Model for Server Load and Performance Prediction in Data Center
Recurrent neural network (RNN) has been widely applied to many sequential tagging tasks such as natural language process (NLP) and time series analysis, and it has been proved that RNN works well in those areas.
Zheng Huang +4 more
doaj +1 more source
BRAT: A BRidge Attack Tool for Cyber Security Assessments of Maritime Systems
Christian Hemminghaus +2 more
openalex +1 more source
Abstract AI‐based large language models (LLMs) have gradually made their way into various fields, transforming industries and changing the way we solve problems. LLMs have great potential in healthcare, where they can share the burden of data management, retrieval, and decision‐making.
Muhammad Umar +11 more
wiley +1 more source
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source
Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source

