Results 151 to 160 of about 150,359 (291)

An Overview of Deep Learning Techniques for Big Data IoT Applications

open access: yesInternational Journal of Communication Systems, Volume 39, Issue 4, 10 March 2026.
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur   +2 more
wiley   +1 more source

Cyber threat intelligence sharing platforms

open access: yes, 2021
The use of threat intelligence to improve the cybersecurity of organizations is on the rise. Cyber-attacks are steadily increasing and becoming more sophisticated. Threat intelligence and threat intelligence sharing play a critical role in combating cyber-crime.
openaire   +1 more source

Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende

open access: yes
JCMS: Journal of Common Market Studies, EarlyView.
Benjamin Daßler, Moritz Weiss
wiley   +1 more source

How New Issues Become Polarized: Partisan Triggers and Subsystem Shopping in Early AI Policymaking

open access: yesPolicy &Internet, Volume 18, Issue 1, March 2026.
ABSTRACT Early AI policymaking in the United States appeared bipartisan, but subsequent developments raise the question of whether AI policy will become more polarized over time. To examine how partisanship takes root around novel policy issues, we perform a mixed‐methods study, analyzing survey data from 129 state legislators in 44 states and ...
Robin Jacobson   +2 more
wiley   +1 more source

Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems

open access: yesSoftware: Practice and Experience, Volume 56, Issue 3, Page 239-259, March 2026.
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar   +4 more
wiley   +1 more source

Modeling Cyber Threat Intelligence

open access: yesProceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Fredrik Borg   +4 more
openaire   +1 more source

Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli   +3 more
wiley   +1 more source

The Role of Creativity and Innovation Management Research in Times of Changing Security and Defence Realities

open access: yesCreativity and Innovation Management, Volume 35, Issue 1, Page 84-90, March 2026.
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen   +4 more
wiley   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 230-246, March 2026.
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy