Results 111 to 120 of about 14,082 (218)
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
A heavy-duty vehicle (HDV) finds applications in various fields, particularly logistics and freight transportation, involving the movement of containers from ports to local warehouses and eventual delivery destinations.
Labid Bin Bashar +7 more
doaj +1 more source
Digital Agriculture: Past, Present, and Future
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang +3 more
wiley +1 more source
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein +3 more
wiley +1 more source
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen +4 more
wiley +1 more source
ABSTRACT In recent decades, digital transformation has proliferated and prevailed among firms, profoundly affecting their operations, investments, and information management. To the extent that applying digital technologies has pros and cons to business activities, its implications for future firm performance remain uncertain to stock market ...
Guanming He +2 more
wiley +1 more source
Revisiting Wireless Cyberattacks on Vehicles
The automotive industry has been a prime target for cybercriminals for decades, with attacks becoming more sophisticated as vehicles integrate advanced digital technologies. In response, new standards and regulations have been introduced, requiring manufacturers to implement robust cybersecurity measures to obtain necessary certifications.
Roberto Gesteira-Miñarro +2 more
openaire +3 more sources
Antimicrobial stewardship during a cyberattack [PDF]
Lindsay M. Smith, John W. Ahern
openaire +2 more sources
Correction: Mathematical analysis of the dynamics of cyberattack propagation in IoT networks. [PDF]
PLOS One Staff.
europepmc +1 more source

