Terrorism, Perceived Threat, and Support for Surveillance: A Virtual Reality Experiment on Cyber vs. Conventional Terrorism. [PDF]
Snider KLG +5 more
europepmc +1 more source
Abstract Research shows that spreading conspiracy theories impacts leaders' reputations; yet, it remains unclear how leaders are viewed when their theories are debunked. Across four studies (N = 1437), we explored whether conveying a conspiracy theory, regardless of its accuracy, influences followers' impressions of leader dominance, competence and ...
Shen Cao +2 more
wiley +1 more source
Privacy-preserving cyberthreat detection in decentralized social media with federated cross-modal graph transformers. [PDF]
Premkumar D, Nachimuthu SK.
europepmc +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source
Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework. [PDF]
Macrino N, Pallas Enguita S, Chen CH.
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
A generative AI-driven cybersecurity framework for small and medium enterprises software development: an ANN-ISM approach. [PDF]
Awan M +5 more
europepmc +1 more source
This review synthesizes AI advancements in food systems, leveraging machine learning, computer vision, robotics, and IoT for 96%–100% accurate quality inspection, 30% reduced downtime, and enhanced traceability from farm to fork. It highlights transformative potential in sustainability and SDGs while addressing data, ethical, and scalability challenges
Muhammad Waqar +9 more
wiley +1 more source
AI-based intelligent sensing detection of cybersecurity threats using multimodal sensor data in smart devices. [PDF]
Latif M +6 more
europepmc +1 more source
ABSTRACT In an era of proliferating but divergent data protection regimes, the European Union's rights‐based approach and China's sovereignty‐centric model have become two dominant poles of global data governance. This article examines how multinational enterprises navigate compliance under these dual systems and how that compliance is shaped through ...
Yiping Cao
wiley +1 more source

