Results 281 to 290 of about 164,979 (324)
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments. [PDF]
Nalinipriya G +6 more
europepmc +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Open Innovation for Circular Business Models: Addressing the Right Challenge at the Right Time
ABSTRACT Academic Summary In response to escalating societal challenges, such as climate change and resource constraints, this article examines the transition from linear toward circular business models (CBMs). It explores the challenges of CBM transitions and how to tackle them through open innovation.
Daniel Wörner +4 more
wiley +1 more source
Network attack knowledge inference with graph convolutional networks and convolutional 2D KG embeddings. [PDF]
Ren W, Zhang H, Lei Y.
europepmc +1 more source
On the (Mis)Use of Machine Learning With Panel Data
ABSTRACT We provide the first systematic assessment of data leakage issues in the use of machine learning on panel data. Our organising framework clarifies why neglecting the cross‐sectional and longitudinal structure of these data leads to hard‐to‐detect data leakage, inflated out‐of‐sample performance, and an inadvertent overestimation of the real ...
Augusto Cerqua +2 more
wiley +1 more source
Safeguarding digital livestock farming - a comprehensive cybersecurity roadmap for dairy and poultry industries. [PDF]
Neethirajan S.
europepmc +1 more source
ABSTRACT This research investigates the configurations of openness and policy conditions influencing the implementation of environmental justice (EJ) open government data (OGD) dashboards across U.S. states. EJ dashboards represent a shift from a civic‐tech approach to OGD, which emphasizes the public release of vast amounts of data, to a problem ...
Federica Fusi +2 more
wiley +1 more source
Enhanced IoT threat detection using Graph-Regularized neural networks optimized by Sea-Lion algorithm. [PDF]
Santhosh DT +5 more
europepmc +1 more source
Patton, Mark +3 more
openaire +1 more source

