Results 81 to 90 of about 4,651 (188)

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

CYBERATTACKS AND DISINFORMATION CAMPAIGNS

open access: yesJournal of Social Political Sciences, 2020
Donald Trump's victory over Hillary Clinton in 2016 US Presidential Election is one of the most shocking political events of this decade. Various controversies and irregularities have been examined and led to alleged Russia’s roles in the election ...
Yudha Akbar Pally
doaj  

Digital Agriculture: Past, Present, and Future

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 1, February 2026.
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang   +3 more
wiley   +1 more source

Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions

open access: yesIEEE Access
Open-source Programmable Logic Controller (OpenPLC) software is designed to be vendor-natural and run on almost any computer or low-cost embedded devices e.g., Raspberry Pi, Ardunio, and other controllers.
Wael Alsabbagh   +2 more
doaj   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

Eel and Grouper Optimization-Based Fuzzy FOPI-TIDμ-PIDA Controller for Frequency Management of Smart Microgrids Under the Impact of Communication Delays and Cyberattacks

open access: yesMathematics
In a smart microgrid (SMG) system that deals with unpredictable loads and incorporates fluctuating solar and wind energy, it is crucial to have an efficient method for controlling frequency in order to balance the power between generation and load.
Kareem M. AboRas   +2 more
doaj   +1 more source

Data‐Driven Dual‐Channel Dynamic Event‐Triggered Load Frequency Control for Multiarea Power Systems Under DoS Attacks

open access: yesEnergy Science &Engineering, Volume 14, Issue 2, Page 780-792, February 2026.
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen   +4 more
wiley   +1 more source

Artificial Intelligence and ComputerForensics

open access: yesТеория и практика судебной экспертизы
. As a result of large-scale digitalization of all spheres of human activity and the rapid introduction of artificial intelligence technologies, the need has arisen for forensic support for legal proceedings in cases in which artificial intelligence has ...
Yu. S. Rudenkova   +2 more
doaj   +1 more source

Does Digitalization Imply Uncertainty About the Future Prospects of a Firm? Evidence From Analyst Forecast Accuracy

open access: yesFinancial Review, Volume 61, Issue 1, Page 59-91, February 2026.
ABSTRACT In recent decades, digital transformation has proliferated and prevailed among firms, profoundly affecting their operations, investments, and information management. To the extent that applying digital technologies has pros and cons to business activities, its implications for future firm performance remain uncertain to stock market ...
Guanming He   +2 more
wiley   +1 more source

Central and Eastern European Countries under Cyberthreats

open access: yesPolish Political Science Yearbook, 2017
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this issue from the perspective of Central and Eastern European Countries.
Joanna Świątkowska
doaj   +1 more source

Home - About - Disclaimer - Privacy