Results 51 to 60 of about 278,396 (266)

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Advancing Sustainable Development in Manufacturing: A Strategic Framework for Overcoming Green–Lean Implementation Barriers

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Manufacturing's transition to sustainable development depends on integrating green with lean under credible environmental policy and stakeholder engagement. Although benefits are well established, the literature underspecifies implementation barriers and their prioritisation. This study identifies, structures, and prioritises barriers to green–
Jose Arturo Garza‐Reyes   +4 more
wiley   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Cultivating Circularity: Harnessing Industry 4.0 and Stakeholder Engagement for a Sustainable Agrifood Future in Brazil

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem   +3 more
wiley   +1 more source

MAP-GAN: multi-attribute facial privacy protection model without losing identification

open access: yesCybersecurity
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang   +5 more
doaj   +1 more source

Dual-Factor Adaptive Robust Aggregation for Secure Federated Learning in IoT Networks

open access: yesFuture Internet
Federated Learning (FL) has been widely adopted in privacy-sensitive and distributed environments. However, training stability becomes significantly challenged when differential privacy (DP) noise and Byzantine client behaviors coexist, as these ...
Zuan Song   +4 more
doaj   +1 more source

A Taxonomy of Predictive Maintenance as a Basis for Supra‐Regional Sustainability Monitoring—Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The concept of predictive maintenance in advanced manufacturing systems is crucial from the point of view of resource efficiency in the era of high competitiveness forced by energy transformation in the digital economy. Against the backdrop of sustainability and the opportunities a data cooperative offers, the combination of predictive ...
Christian Schachtner   +6 more
wiley   +1 more source

Zero Deforestation Commitments and Industry 4.0 Enabling Technologies: An Analysis of Their Role in Mitigating Deforestation

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study examines the role of corporate zero‐deforestation commitments (ZDCs) and Industry 4.0 (I4.0) enabling technologies in mitigating deforestation. Drawing on data from 110 companies included in the Forest 500 dataset, the research explores whether sustainability commitments and digital innovation influence firms' deforestation ...
Valentina Beretta   +2 more
wiley   +1 more source

Corporate Decarbonization via Technology and Management

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy