Results 71 to 80 of about 278,396 (266)
ABSTRACT Industry 5.0 has emerged to address the limitations of Industry 4.0 by emphasizing inclusive sustainability through environmentalism, human‐centricity, and resilience. However, its development faces barriers across technological, organizational, and social dimensions.
Mohammad Ali Beheshtinia +4 more
wiley +1 more source
Cyber‐physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real‐world conditions in real time.
Kai Hung Tang +4 more
doaj +1 more source
Malicious email mitigation strategies [PDF]
Introduction Socially-engineered emails containing malicious attachments and embedded links have been observed by the Australian Signals Directorate (ASD) being used in targeted cyber intrusions against organisations.
Australian Cyber Security Centre
core
ABSTRACT The emerging concept of Hubs for Circularity (H4Cs) presents an opportunity to create collaborative, self‐sustaining regional industrial ecosystems that drive circular economy transitions at scale. However, the operationalisation of H4Cs faces financial, organisational and data‐driven challenges.
Aditya Tripathi +3 more
wiley +1 more source
Detection of Electric Network Frequency in Audio Using Multi-HCNet
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li +6 more
doaj +1 more source
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li +4 more
doaj +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
ABSTRACT Widespread digital adoption has challenged our understanding of how these tools reshape collaboration, trust and sustainability outcomes across different institutional and network contexts. As networks now pursue resilience and sustainable development in parallel, we map emerging research directions and identify how collaboration and ...
Ari Carisza Graha Prasetia +1 more
wiley +1 more source
A Critical Analysis of Microsoft's Rhetoric and Reality of Sustainability Engagement
ABSTRACT This study critically examines Microsoft's environmental, social and governance (ESG) rhetoric and operational reality, to offer insights that extend beyond conventional greenwashing or bluewashing. Drawing on over 20 years of Microsoft's sustainability reports (2003–2024), third‐party ESG evaluations and media investigations, it employs ...
Omaima A. G. Hassan, Iqbal Khadaroo
wiley +1 more source
Exploring homogeneous dense groups is one of the important issues in social network structure measurement. k-core decomposition and core member filtering are common methods to uncover homogeneous dense groups in a network.
Zeyu Zhang +7 more
doaj +1 more source

