Results 151 to 160 of about 150,359 (291)
An Overview of Deep Learning Techniques for Big Data IoT Applications
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur +2 more
wiley +1 more source
Cyber threat intelligence sharing platforms
The use of threat intelligence to improve the cybersecurity of organizations is on the rise. Cyber-attacks are steadily increasing and becoming more sophisticated. Threat intelligence and threat intelligence sharing play a critical role in combating cyber-crime.
openaire +1 more source
Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende
JCMS: Journal of Common Market Studies, EarlyView.
Benjamin Daßler, Moritz Weiss
wiley +1 more source
How New Issues Become Polarized: Partisan Triggers and Subsystem Shopping in Early AI Policymaking
ABSTRACT Early AI policymaking in the United States appeared bipartisan, but subsequent developments raise the question of whether AI policy will become more polarized over time. To examine how partisanship takes root around novel policy issues, we perform a mixed‐methods study, analyzing survey data from 129 state legislators in 44 states and ...
Robin Jacobson +2 more
wiley +1 more source
Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar +4 more
wiley +1 more source
Modeling Cyber Threat Intelligence
Fredrik Borg +4 more
openaire +1 more source
Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli +3 more
wiley +1 more source
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen +4 more
wiley +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru +2 more
wiley +1 more source

