ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
The National Cybersecurity Teaching Coalition: Expanding Cybersecurity Education Opportunities
The increasing prevalence of cybersecurity threats and the shortage of qualified professionals necessitate innovative solutions for cybersecurity education at all levels.
Paul Wagner +4 more
doaj
Cybersecurity in Radio Frequency Technologies: A Scientometric and Systematic Review with Implications for IoT and Wireless Applications. [PDF]
Araújo PR +3 more
europepmc +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Digital health system integration in Ghana: a scoping review of governance arrangements, interoperability aspirations, and regulatory gaps. [PDF]
Nyarko S, Atinga RA, Bardoe D, Owusu AN.
europepmc +1 more source
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li +5 more
wiley +1 more source
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
Application research on network security operation automation practice based on RPA technology
The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive ...
ZHOU Ying
doaj
Enhanced cybersecurity threat detection using novel tri-metaheuristic loss functions in generative adversarial networks with adaptive attention preservation for network traffic augmentation. [PDF]
Khalil HM, Elrefaiy A, Elbaz M, Loey M.
europepmc +1 more source

