Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. [PDF]
Renaud K, Coles-Kemp L.
europepmc +1 more source
I5.0‐MM: Beyond Automation Toward Human‐Centric Sustainable Manufacturing
ABSTRACT Human‐centricity, a core tenet of Industry 5.0, underscores the incorporation of human necessities and societal values into industrial transformation. Maturity models in Industry 4.0 have been extensively used to evaluate digital readiness; they focus on technological aspects, inadequately addressing sustainability, collaboration, and socio ...
Khaled Djebbouri +3 more
wiley +1 more source
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou +3 more
doaj +1 more source
Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray +7 more
wiley +1 more source
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. [PDF]
Yadav A, Kumar A, Singh V.
europepmc +1 more source
Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar +4 more
wiley +1 more source
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data.
Qian Feng +3 more
doaj +1 more source
Cyber security challenges in Smart Cities: Safety, security and privacy
Adel Elmaghraby, Michael Losavio
openalex +2 more sources
An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla +3 more
wiley +1 more source
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.
Jamil Ispahany +3 more
doaj +1 more source

