Results 221 to 230 of about 142,803 (291)
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework. [PDF]
Macrino N, Pallas Enguita S, Chen CH.
europepmc +1 more source
Knowledge Graphs and Critical Infrastructures: Friends or Foes?
Conceptual overview of Knowledge Graph integration in Critical Infrastructures, illustrating interconnected systems, data flows, and their role in enhancing resilience and operational intelligence. ABSTRACT Knowledge Graphs (KGs) are a natural evolution of data models representing and connecting data in a network of nodes and relations.
José Miguel Blanco +3 more
wiley +1 more source
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source
ABSTRACT This study investigates the impact of digital transformation and emerging technologies, particularly generative artificial intelligence (GenAI), on the readiness and practices of crisis communication professionals in Hong Kong (HK). Despite growing theoretical advances, recent literature remains predominantly Western‐centric, with limited ...
Cindy Sing Bik Ngai +3 more
wiley +1 more source
BERT-spaCy hybrid NLP and blockchain-enhanced adaptive CTI for IOC extraction and threat prediction. [PDF]
Mishra S, Alfahidah RA, Alharbi F.
europepmc +1 more source
How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley +1 more source
Nature-inspired swarm optimization paradigms for securing semantic web frameworks against DDoS attacks: a computational approach. [PDF]
Ganguli C +3 more
europepmc +1 more source
Abstract Organizational risk exposure arises from external sources and internal activities intended to reduce the potential for risks to cause harm. While organizational risk exposure is necessary to realize opportunities, misalignment between risk management and risk exposure may achieve the opposite outcomes.
Emma Soane
wiley +1 more source

