Results 81 to 90 of about 4,651 (188)
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
CYBERATTACKS AND DISINFORMATION CAMPAIGNS
Donald Trump's victory over Hillary Clinton in 2016 US Presidential Election is one of the most shocking political events of this decade. Various controversies and irregularities have been examined and led to alleged Russia’s roles in the election ...
Yudha Akbar Pally
doaj
Digital Agriculture: Past, Present, and Future
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang +3 more
wiley +1 more source
Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions
Open-source Programmable Logic Controller (OpenPLC) software is designed to be vendor-natural and run on almost any computer or low-cost embedded devices e.g., Raspberry Pi, Ardunio, and other controllers.
Wael Alsabbagh +2 more
doaj +1 more source
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein +3 more
wiley +1 more source
In a smart microgrid (SMG) system that deals with unpredictable loads and incorporates fluctuating solar and wind energy, it is crucial to have an efficient method for controlling frequency in order to balance the power between generation and load.
Kareem M. AboRas +2 more
doaj +1 more source
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen +4 more
wiley +1 more source
Artificial Intelligence and ComputerForensics
. As a result of large-scale digitalization of all spheres of human activity and the rapid introduction of artificial intelligence technologies, the need has arisen for forensic support for legal proceedings in cases in which artificial intelligence has ...
Yu. S. Rudenkova +2 more
doaj +1 more source
ABSTRACT In recent decades, digital transformation has proliferated and prevailed among firms, profoundly affecting their operations, investments, and information management. To the extent that applying digital technologies has pros and cons to business activities, its implications for future firm performance remain uncertain to stock market ...
Guanming He +2 more
wiley +1 more source
Central and Eastern European Countries under Cyberthreats
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this issue from the perspective of Central and Eastern European Countries.
Joanna Świątkowska
doaj +1 more source

