Results 161 to 170 of about 150,359 (291)
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Digital Agriculture: Past, Present, and Future
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang +3 more
wiley +1 more source
Meta Reinforcement Learning for Automated Cyber Defence
ABSTRACT Reinforcement learning (RL) solutions have shown considerable promise for automating the defense of networks to cyber attacks. However, a limitation to their real world deployment is the sample efficiency and generalizability of RL agents. This means that even small changes to attack types require a new agent to be trained from scratch.
Andrew Thomas, Nick Tillyer
wiley +1 more source
Multi‐Agent Reinforcement Learning for Cyber Defence Transferability and Scalability
A method for using mutli‐agent reinforcement learning that allows for zero shot transfer across network setups. Diagrams show the local observation construction, training and agent mapping process. The results for novel 15 and 30 node networks show effective transfer and improved scaling performance. ABSTRACT Reinforcement learning (RL) has shown to be
Andrew Thomas +2 more
wiley +1 more source
Joint Extraction of Cyber Threat Intelligence Entity Relationships Based on a Parallel Ensemble Prediction Model. [PDF]
Wang H, Zhang S, Wang Z, Sun J, Liu Q.
europepmc +1 more source
Cyber-threat intelligence for security decision-making: A review and research agenda for practice
Scott Ainslie +3 more
semanticscholar +1 more source
Unlocking IIoT Potential with AI. ABSTRACT Artificial Intelligence (AI) is playing an increasingly vital role in the Industrial Internet of Things (IIoT), enabling predictive analytics, real‐time monitoring, and autonomous operations across industries such as manufacturing, logistics, and energy.
Tinashe Magara, Mampilo Phahlane
wiley +1 more source
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein +3 more
wiley +1 more source
A dataset for cyber threat intelligence modeling of connected autonomous vehicles. [PDF]
Wang Y +5 more
europepmc +1 more source
Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley +1 more source

