Results 91 to 100 of about 157,721 (269)

Cybersecurity by executive order [PDF]

open access: yes
This report explores the details of the Obama Administration\u27s executive order on cybersecurity, breaking down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can be applied to
Klee Aiken
core  

Real‐Time Data‐Driven Fault Diagnosis of Photovoltaic Arrays Using an Edge‐Server Machine‐Learning Framework

open access: yesEnergy Science &Engineering, EarlyView.
A real‐time, data‐driven framework detects and classifies photovoltaic array faults using edge sensing and server‐side machine learning. Ensemble tree models achieve near‐perfect accuracy with low latency, enabling practical, low‐cost deployment for reliable PV monitoring and intelligent maintenance.
Premkumar Manoharan   +4 more
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay

open access: yesInformation
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia   +3 more
doaj   +1 more source

Bipolar q $q$‐Fractional Fuzzy Aggregation Operators for Multi‐Criteria Decision‐Making in Optimal Renewable Energy Selection

open access: yesEnergy Science &Engineering, EarlyView.
This study introduces bipolar q‐fractional fuzzy sets and new aggregation operators to support renewable energy selection under uncertainty. The proposed decision‐making framework effectively integrates positive and negative evaluations, ensuring consistent ranking and robust performance, as demonstrated through practical analysis and comparative ...
Sagvan Y. Musa   +3 more
wiley   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Hybrid Osprey‐Salp Swarm Optimization Algorithm for Single and Multiobjective Optimal Power Flow in Smart Grids With Renewable Energy Integration

open access: yesEnergy Science &Engineering, EarlyView.
The proposed hybrid osprey‐salp swarm optimization algorithm addresses optimal power flow (OPF) problems in smart grids incorporating solar, hydro, and thermal generators. The algorithm is validated on Institute of Electrical and Electronics Engineers 30‐, 57‐, and 118‐bus test systems across five single and multiobjective OPF scenarios.
Mujtaba Ali   +5 more
wiley   +1 more source

Navigating secure storage requirements for EUDI Wallets: a review paper

open access: yesEURASIP Journal on Information Security
The European Digital Identity Wallet (EUDI Wallet) plays a pivotal role in shaping digital identity across the EU, necessitating a secure storage solution compliant with eIDAS2 regulation.
Zahra Ebadi Ansaroudi   +3 more
doaj   +1 more source

Predicting and Preventing Turnover in Industry 4.0: Understanding the Impact of Artificial Intelligence Adoption on Employee Turnover

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT With the increasing adoption of Artificial Intelligence (AI) in the workplace, employees' career paths have become more diverse and less predictable in the era of Industry 4.0. As technological transformations accelerate, employee turnover patterns are also changing, as reflected in the growing prevalence of occupational transitions and large ...
Young‐Kook Moon, Tanya Mitropoulos
wiley   +1 more source

Home - About - Disclaimer - Privacy