Results 111 to 120 of about 288,624 (313)

The contribution of vibrational spectroscopy and data analytics towards the achievement of the global sustainability goals

open access: yesJournal of the Science of Food and Agriculture, EarlyView.
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley   +1 more source

What changed in the cyber-security after COVID-19? [PDF]

open access: yesComput Secur, 2022
Kumar R, Sharma S, Vachhani C, Yadav N.
europepmc   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

The Prevalence of Different Types of Bullying and Their Predictors Among 8th Graders in Post‐Soviet Countries: Cross‐National Insights From Kazakhstan and Russia. Findings From Trends in International Mathematics and Science Study 2019

open access: yesPsychology in the Schools, EarlyView.
ABSTRACT Despite growing research on bullying in Western contexts, less is known about its prevalence and predictors in post‐Soviet nations. This study explores bullying among 8th‐grade students in Kazakhstan and Russia‐two post‐Soviet countries with contrasting development levels but shared historical ties.
Saltanat Kaliyeva
wiley   +1 more source

A New Image Encryption Method Using an Optimized Smart Codebook

open access: yesHuman Behavior and Emerging Technologies
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj   +1 more source

In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]

open access: yesSensors (Basel), 2022
Rathore RS   +3 more
europepmc   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon

open access: yesIEEE Access
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany   +3 more
doaj   +1 more source

LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]

open access: yesSensors (Basel), 2023
Bouzidi M   +4 more
europepmc   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy