ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Cybersecurity in connected medical devices: a policy agenda for the NHS. [PDF]
Toparti O, Rajput K, Darzi A, Ghafur S.
europepmc +1 more source
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
A generative AI cybersecurity risks mitigation model for code generation: using ANN-ISM hybrid approach. [PDF]
Al-Hashimi HA.
europepmc +1 more source
Cybersecurity in Radio Frequency Technologies: A Scientometric and Systematic Review with Implications for IoT and Wireless Applications. [PDF]
Araújo PR +3 more
europepmc +1 more source
Application research on network security operation automation practice based on RPA technology
The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive ...
ZHOU Ying
doaj +2 more sources
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
Designing Deliberative Lobbying: Three Institutional Solutions for an Open Lobby Democracy
Abstract Debates on lobbying regulation have focused overwhelmingly on transparency, yet disclosure alone does little to address the deeper democratic challenges of unequal power, narrow representation and public distrust. This article argues that lobbying regulation should be designed not only to make influence visible, but also to make it fairer and ...
Alberto Bitonti
wiley +1 more source
A Cybersecurity NER Method Based on Hard and Easy Labeled Training Data Discrimination. [PDF]
Ye L, Wu Y, Zhang H, Ge M.
europepmc +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source

