Results 151 to 160 of about 80,725 (273)

Sharing conspiracy theories and staying in power: How leaders' false theories influence leadership perception

open access: yesBritish Journal of Social Psychology, Volume 65, Issue 3, July 2026.
Abstract Research shows that spreading conspiracy theories impacts leaders' reputations; yet, it remains unclear how leaders are viewed when their theories are debunked. Across four studies (N = 1437), we explored whether conveying a conspiracy theory, regardless of its accuracy, influences followers' impressions of leader dominance, competence and ...
Shen Cao   +2 more
wiley   +1 more source

Building centaur responders: is emergency management ready for artificial intelligence?

open access: yesDisasters, Volume 50, Issue 3, July 2026.
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte   +1 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Developing a Framework for the Quality‐Driven Migration to Microservices: A Multi‐Method Design Science Study

open access: yesSoftware: Practice and Experience, Volume 56, Issue 6, Page 658-686, June 2026.
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch   +6 more
wiley   +1 more source

Cyber security situational awareness [PDF]

open access: yes, 2016
Tianfield, Huaglory
core   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy