Results 211 to 220 of about 137,074 (286)
Enhanced IoT threat detection using Graph-Regularized neural networks optimized by Sea-Lion algorithm. [PDF]
Santhosh DT +5 more
europepmc +1 more source
Unlocking IIoT Potential with AI. ABSTRACT Artificial Intelligence (AI) is playing an increasingly vital role in the Industrial Internet of Things (IIoT), enabling predictive analytics, real‐time monitoring, and autonomous operations across industries such as manufacturing, logistics, and energy.
Tinashe Magara, Mampilo Phahlane
wiley +1 more source
Towards Optimal Sensor Placement for Cybersecurity: An Extensible Model for Defensive Cybersecurity Sensor Placement Evaluation. [PDF]
Wagner N, Damodaran SK, Reavey M.
europepmc +1 more source
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein +3 more
wiley +1 more source
An efficient federated learning based defense mechanism for software defined network cyber threats through machine learning models. [PDF]
Amin R +5 more
europepmc +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
Mapping Cyber Bot Behaviors: Understanding Payload Patterns in Honeypot Traffic. [PDF]
Wang S, Tu C, Zhang Y, Zhang M, Xue P.
europepmc +1 more source
Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley +1 more source
Proactive identification of cybersecurity compromises via the PROID compromise assessment framework. [PDF]
Alkhalaf AA +3 more
europepmc +1 more source
ABSTRACT This study explores how Norwegian leaders in rural municipalities attend to disaster risk governance and prepare for resilient response to threats from systemic, interconnected, and cascading hazards. Systemic risk management in the Norwegian municipalities will depend on the context and how critical organizational processes are managed by the
Sofie Steinsund +3 more
wiley +1 more source

