Results 91 to 100 of about 157,721 (269)
Cybersecurity by executive order [PDF]
This report explores the details of the Obama Administration\u27s executive order on cybersecurity, breaking down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can be applied to
Klee Aiken
core
A real‐time, data‐driven framework detects and classifies photovoltaic array faults using edge sensing and server‐side machine learning. Ensemble tree models achieve near‐perfect accuracy with low latency, enabling practical, low‐cost deployment for reliable PV monitoring and intelligent maintenance.
Premkumar Manoharan +4 more
wiley +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia +3 more
doaj +1 more source
This study introduces bipolar q‐fractional fuzzy sets and new aggregation operators to support renewable energy selection under uncertainty. The proposed decision‐making framework effectively integrates positive and negative evaluations, ensuring consistent ranking and robust performance, as demonstrated through practical analysis and comparative ...
Sagvan Y. Musa +3 more
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
The proposed hybrid osprey‐salp swarm optimization algorithm addresses optimal power flow (OPF) problems in smart grids incorporating solar, hydro, and thermal generators. The algorithm is validated on Institute of Electrical and Electronics Engineers 30‐, 57‐, and 118‐bus test systems across five single and multiobjective OPF scenarios.
Mujtaba Ali +5 more
wiley +1 more source
Navigating secure storage requirements for EUDI Wallets: a review paper
The European Digital Identity Wallet (EUDI Wallet) plays a pivotal role in shaping digital identity across the EU, necessitating a secure storage solution compliant with eIDAS2 regulation.
Zahra Ebadi Ansaroudi +3 more
doaj +1 more source
ABSTRACT With the increasing adoption of Artificial Intelligence (AI) in the workplace, employees' career paths have become more diverse and less predictable in the era of Industry 4.0. As technological transformations accelerate, employee turnover patterns are also changing, as reflected in the growing prevalence of occupational transitions and large ...
Young‐Kook Moon, Tanya Mitropoulos
wiley +1 more source

