Results 101 to 110 of about 14,082 (218)

Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks?

open access: yesSmart Cities
Intrusion detection systems are essential for detecting network cyberattacks. As the sophistication of cyberattacks increases, it is critical that defense technologies adapt to counter them.
Jowaria Khan   +6 more
doaj   +1 more source

Datasheets for machine learning sensors

open access: yesAI Magazine, Volume 47, Issue 1, Spring 2026.
Abstract Machine learning (ML) is becoming prevalent in embedded AI sensing systems. These “ML sensors” enable context‐sensitive, real‐time data collection and decision‐making across diverse applications ranging from anomaly detection in industrial settings to wildlife tracking for conservation efforts.
Matthew Stewart   +14 more
wiley   +1 more source

Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks

open access: yesFuture Internet
Intrusion detection systems (IDSs) are crucial for identifying cyberattacks on in-vehicle networks. To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL).
Muzun Althunayyan   +3 more
doaj   +1 more source

Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende

open access: yes
JCMS: Journal of Common Market Studies, EarlyView.
Benjamin Daßler, Moritz Weiss
wiley   +1 more source

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

Responding to cyberattacks: Prospects for the EU Cyber Diplomacy Toolbox. EPC Discussion paper, 18 March 2019 [PDF]

open access: yes, 2019
Malicious cyber activities have become a growing threat, a fact that has become more visible in recent years through several massive cyberattacks. While the European Union (EU) has been active in the field of cybersecurity for a number of years, it has ...
Ivan, Paul
core  

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

Efficient Cyberattack Detection Methods in Industrial Control Systems

open access: yesSensors
The article deals with the issue of detecting cyberattacks on control algorithms running in a real Programmable Logic Controller (PLC) and controlling a real laboratory control plant. The vulnerability of the widely used Proportional–Integral–Derivative (
Piotr Marusak   +7 more
doaj   +1 more source

The Role of Creativity and Innovation Management Research in Times of Changing Security and Defence Realities

open access: yesCreativity and Innovation Management, Volume 35, Issue 1, Page 84-90, March 2026.
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen   +4 more
wiley   +1 more source

Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains

open access: yesIEEE Access
The continuing proliferation of Cyber Physical Systems (CPSs), those that integrate electronic control circuitry with a mechanical system allowing software commands to affect the physical world, while allowing for new efficiencies and convenience, also ...
Andrew Kacmarcik, Milos Prvulovic
doaj   +1 more source

Home - About - Disclaimer - Privacy