Results 211 to 220 of about 137,074 (286)

Enhanced IoT threat detection using Graph-Regularized neural networks optimized by Sea-Lion algorithm. [PDF]

open access: yesSci Rep
Santhosh DT   +5 more
europepmc   +1 more source

Unlocking IIoT Potential: A Systematic Review of AI Applications, Adoption Drivers, and Implementation Barriers

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Unlocking IIoT Potential with AI. ABSTRACT Artificial Intelligence (AI) is playing an increasingly vital role in the Industrial Internet of Things (IIoT), enabling predictive analytics, real‐time monitoring, and autonomous operations across industries such as manufacturing, logistics, and energy.
Tinashe Magara, Mampilo Phahlane
wiley   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

Empowering Software Engineers to Design More Secure Web Applications: Guidelines and Potential of Using LLMs as a Recommender Tool

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 2, February 2026.
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner   +5 more
wiley   +1 more source

Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse

open access: yesRisk Analysis, Volume 46, Issue 2, February 2026.
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley   +1 more source

Crisis Preparedness and Systemic Risk: The Role of Municipal Leaders in Disaster Risk Governance in Norway

open access: yesScandinavian Journal of Psychology, Volume 67, Issue 1, Page 115-128, February 2026.
ABSTRACT This study explores how Norwegian leaders in rural municipalities attend to disaster risk governance and prepare for resilient response to threats from systemic, interconnected, and cascading hazards. Systemic risk management in the Norwegian municipalities will depend on the context and how critical organizational processes are managed by the
Sofie Steinsund   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy