Results 161 to 170 of about 150,359 (291)

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Digital Agriculture: Past, Present, and Future

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 1, February 2026.
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang   +3 more
wiley   +1 more source

Meta Reinforcement Learning for Automated Cyber Defence

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
ABSTRACT Reinforcement learning (RL) solutions have shown considerable promise for automating the defense of networks to cyber attacks. However, a limitation to their real world deployment is the sample efficiency and generalizability of RL agents. This means that even small changes to attack types require a new agent to be trained from scratch.
Andrew Thomas, Nick Tillyer
wiley   +1 more source

Multi‐Agent Reinforcement Learning for Cyber Defence Transferability and Scalability

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
A method for using mutli‐agent reinforcement learning that allows for zero shot transfer across network setups. Diagrams show the local observation construction, training and agent mapping process. The results for novel 15 and 30 node networks show effective transfer and improved scaling performance. ABSTRACT Reinforcement learning (RL) has shown to be
Andrew Thomas   +2 more
wiley   +1 more source

Cyber-threat intelligence for security decision-making: A review and research agenda for practice

open access: yesComputers & security, 2023
Scott Ainslie   +3 more
semanticscholar   +1 more source

Unlocking IIoT Potential: A Systematic Review of AI Applications, Adoption Drivers, and Implementation Barriers

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Unlocking IIoT Potential with AI. ABSTRACT Artificial Intelligence (AI) is playing an increasingly vital role in the Industrial Internet of Things (IIoT), enabling predictive analytics, real‐time monitoring, and autonomous operations across industries such as manufacturing, logistics, and energy.
Tinashe Magara, Mampilo Phahlane
wiley   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse

open access: yesRisk Analysis, Volume 46, Issue 2, February 2026.
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley   +1 more source

Home - About - Disclaimer - Privacy