Results 101 to 110 of about 140,490 (288)

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

A Review of Human–AI Synergy in Smart Energy Management Concepts, Functions, Applications, and Future Frontiers

open access: yesEnergy Internet, EarlyView.
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An   +5 more
wiley   +1 more source

CYBER THREAT INDEX

open access: yes, 2023
This article provides an overview of cyber threats in education and other industries, DDoS attacks and types, cyber threat index overview, web application attacks, application security threats, data security, DDoS threats, daily attack mapping, network security problems and their prevention actions are highlighted.
openaire   +1 more source

Maritime Cyber Threats and Challenges

open access: yesNational security and the future, 2020
The maritime trade becomes crucial for countries' economy, security and sovereignty. Side by side to the growth of shipping, the vessels themselves and the sea-ports become more and more sophisticated, advanced and controlled by computerized and automated systems.
openaire   +2 more sources

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, EarlyView.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Cyber threats and information crimes [PDF]

open access: yesمجلة الاجتهاد للدراسات القانونية والاقتصادية
Cybercrime has now become one of the features of modern wars, which poses challenges to all developed and developing countries in particular, as all countries are interested in ensuring their national security in the first place, and they cannot achieve ...
العيداني محمد
doaj  

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

A holistic and proactive approach to forecasting cyber threats. [PDF]

open access: yesSci Rep, 2023
Almahmoud Z   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy