Results 111 to 120 of about 14,082 (218)

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Observer-Based Attack and Disturbance Mitigation for Heavy-Duty Vehicles in an Autonomous Docking Application

open access: yesIEEE Access
A heavy-duty vehicle (HDV) finds applications in various fields, particularly logistics and freight transportation, involving the movement of containers from ports to local warehouses and eventual delivery destinations.
Labid Bin Bashar   +7 more
doaj   +1 more source

Digital Agriculture: Past, Present, and Future

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 1, February 2026.
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang   +3 more
wiley   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

Data‐Driven Dual‐Channel Dynamic Event‐Triggered Load Frequency Control for Multiarea Power Systems Under DoS Attacks

open access: yesEnergy Science &Engineering, Volume 14, Issue 2, Page 780-792, February 2026.
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen   +4 more
wiley   +1 more source

Does Digitalization Imply Uncertainty About the Future Prospects of a Firm? Evidence From Analyst Forecast Accuracy

open access: yesFinancial Review, Volume 61, Issue 1, Page 59-91, February 2026.
ABSTRACT In recent decades, digital transformation has proliferated and prevailed among firms, profoundly affecting their operations, investments, and information management. To the extent that applying digital technologies has pros and cons to business activities, its implications for future firm performance remain uncertain to stock market ...
Guanming He   +2 more
wiley   +1 more source

Revisiting Wireless Cyberattacks on Vehicles

open access: yesSensors
The automotive industry has been a prime target for cybercriminals for decades, with attacks becoming more sophisticated as vehicles integrate advanced digital technologies. In response, new standards and regulations have been introduced, requiring manufacturers to implement robust cybersecurity measures to obtain necessary certifications.
Roberto Gesteira-Miñarro   +2 more
openaire   +3 more sources

Cyberattacks

open access: yes, 2023
openaire   +1 more source

Antimicrobial stewardship during a cyberattack [PDF]

open access: yesInfection Control & Hospital Epidemiology, 2021
Lindsay M. Smith, John W. Ahern
openaire   +2 more sources

Home - About - Disclaimer - Privacy