Results 221 to 230 of about 140,490 (288)

Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems

open access: yesSoftware: Practice and Experience, Volume 56, Issue 3, Page 239-259, March 2026.
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar   +4 more
wiley   +1 more source

Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks. [PDF]

open access: yesSci Rep
Nurlan Z   +7 more
europepmc   +1 more source

Real‐Time Detection and Prevention of DoS Attack in Unmanned Marine Vehicles Using Machine Learning

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT Unmanned marine vehicles (UMVs) are one of the most crucial components of the underwater communication and surveillance system in the marine and oceanographic environment. This research introduces a novel approach to stabilize the connection in an unstable underwater environment by inheriting features of communication velocities.
Noman Ali   +8 more
wiley   +1 more source

Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli   +3 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, Volume 29, Issue 2, Page 354-367, March 2026.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Geopolitical Risk and Food Inflation

open access: yesThunderbird International Business Review, Volume 68, Issue 2, Page 165-176, March/April 2026.
ABSTRACT This study investigates the complex relationship between geopolitical risk and food inflation, a critical issue for global food security. Using panel data from 177 countries from 2019 to 2021, the research employs a random effects estimation model to analyze the dynamic.
Izaete Leite Nogueira   +2 more
wiley   +1 more source

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]

open access: yesFront Big Data
Nauman M   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy