Results 121 to 130 of about 288,624 (313)
Cyber security picture 2013 [PDF]
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.
core
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Cyber security threats: A never-ending challenge for e-commerce. [PDF]
Liu X +6 more
europepmc +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
Abstract Using Herzberg's two‐factor theory, this paper examines the hygiene and motivation factors that drive (re)development in accounting higher education programmes. Interviews with accounting educators and discipline leaders demonstrate a range of factors at play in the (re)development of accounting programmes in pursuit of embedding relevant ...
Esin Ozdil +3 more
wiley +1 more source
From ESG to Sustainable Development: A Path Designed for the Triple Helix Spheres
ABSTRACT This work examines the relationship between environmental, social, and governance (ESG) initiatives and sustainable development (SD), highlighting a scientific gap in their effective connection. It aims to propose a framework with recommendations for promoting SD through ESG, considering the governmental, business, and academic spheres from ...
Elen Cristina Bravos Giupponi +3 more
wiley +1 more source
Named entity recognition model based on Multi‐BiLSTM and competition mechanism
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou +3 more
doaj +1 more source
Preschool Cyber Security Management System Based on Intelligent Agents. [PDF]
Song J.
europepmc +1 more source
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca +4 more
wiley +1 more source
A Method for Assessing the Risks to Sustainability Posed by Process Operations
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley +1 more source

