Results 281 to 290 of about 196,474 (374)
Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium
Celia Paulsen
openalex +1 more source
Integrating environmental sustainability into EU data law and governance: The case of health data
Abstract The explosion of data‐driven technologies and artificial intelligence (DDAI) has created significant environmental sustainability challenges. DDAI produce intense greenhouse gas emissions and e‐waste, and rely heavily on the extraction of minerals for technological components and on water use to cool down data centres.
Enrique Santamaría Echeverría
wiley +1 more source
Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm. [PDF]
Aljabri J.
europepmc +1 more source
Abstract This contribution considers the revolution in the concept and practice of trust in corporate governance that first moved from trust in “people” to trust in “compliance,” setting the stage for the digitization of trust measures and the digitalization of compliance.
Larry Catá Backer
wiley +1 more source
ABSTRACT Effective cyber incident response and crisis management increasingly relies on the coordination of relevant actors at supranational levels. A polycentric governance structure is one of the institutional arrangements that can promote active participation of involved actors, an aspect decisive for the rapid and effective response to cyber ...
Mazaher Kianpour, Christopher Frantz
wiley +1 more source
A hybrid AI-Blockchain security framework for smart grids. [PDF]
Ghadi YY+6 more
europepmc +1 more source
Trending @ RWULaw: Professor Peter Margulies\u27s Post: Cybersecurity: A \u27Must-Know\u27 for Lawyers and Citizens [PDF]
Margulies, Peter
core +1 more source
How to Govern the Confidence Machine?
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi+2 more
wiley +1 more source
Malicious traffic prediction model for ResNet based on Maple-IDS dataset. [PDF]
Li Q, Wang B, Wen X, Chen Y.
europepmc +1 more source