Results 171 to 180 of about 80,725 (273)
Integrating CTI and threat modeling for cyber resilience: An AHP assessment. [PDF]
Podlesnik L, Bernik I, Mihelič A.
europepmc +1 more source
Encoding Cumulation to Learn Perturbative Nonlinear Oscillatory Dynamics
Weak nonlinearities critically shape the long term behavior of oscillatory systems but are difficult to identify from data. A data‐driven framework is introduced to infer governing equations of weakly nonlinear oscillators from sparse and noisy observations.
Teng Ma +5 more
wiley +1 more source
Windows-APT 2025: A dataset for APT-inspired attack scenarios on windows systems. [PDF]
Mozaffari M +2 more
europepmc +1 more source
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat +5 more
wiley +1 more source
Integrating NLP and Ensemble Learning into Next-Generation Firewalls for Robust Malware Detection in Edge Computing. [PDF]
Moila RL, Velempini M.
europepmc +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
Adaptive Evolution-Inspired Algorithm for Intrusion Detection in Bioinformatics Systems. [PDF]
Alam M, Samal CK, Ali A, Alourani A.
europepmc +1 more source
Rapid 5G/6G evolution demands cross‐layer resource management to address congestion, latency, and reliability in multi‐hop wireless networks. This paper proposes a TOHRP–LBCA framework using DSA and congestion−/topology−/interference‐aware routing and channel allocation, yielding throughput gains, lower latency, improved packet delivery, and higher ...
Emmanuel Ahatsi, Oludolapo Olanrewaju
wiley +1 more source
Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment. [PDF]
van Gerwen S +3 more
europepmc +1 more source
Maintaining power quality (PQ) and minimizing carbon emissions are crucial for sustainable smart grids, especially with increasing renewable energy integration. This paper proposes a novel method combining Adaptive Q‐Wavelet Transform (AQWT) and Kalman Filtering (KF) to predict PQ disturbances and faults while analyzing their impact on carbon emissions.
Abhishek Raj +9 more
wiley +1 more source

