Results 51 to 60 of about 150,359 (291)
Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley +1 more source
An Iterative Review Inspired Adaptive Cyber Threat Detection Model with Context Awareness & Meta-Learning with Generative Hybrid Anomaly Detection [PDF]
Al-driven cyber security frameworks must adapt to more sophisticated threats and context-based detections. We can improve interpretability, flexibility, and resilience in data-scarce and hostile settings in the current model.
Rajurkar Jayant, Jogekar Ravindra
doaj +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley +1 more source
A New AI-Based Semantic Cyber Intelligence Agent
The surge in cybercrime has emerged as a pressing concern in contemporary society due to its far-reaching financial, social, and psychological repercussions on individuals.
Fahim Sufi
doaj +1 more source
Cyber Threat Intelligence Platform [PDF]
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
HoloCyberChain: A distributed entropy-fingerprint blockchain for global cyber threat intelligence [PDF]
This study presents HoloCyberChain, an entropy-driven blockchain framework for decentralized cyber-threat intelligence with formal verification and privacy preservation.
Ali Algarni, Muhammad Zeshan Arshad
doaj +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang +6 more
wiley +1 more source

