Results 31 to 40 of about 157,721 (269)
Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yong Fang +3 more
doaj +1 more source
Institutional Strategies for Cybersecurity in Higher Education Institutions
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj +1 more source
The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security [PDF]
[Excerpt] This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: (1) initiatives to define and identify the federal cybersecurity workforce, and (2)
Francis, Kathryn A, Ginsberg, Wendy
core +2 more sources
The Role of Artificial Intelligence in Medication Management for Older Adults: A Systematic Review
Artificial intelligence enhances medication management for older adults by improving adherence, personalizing treatment, and predicting risks. Despite benefits, challenges remain in usability, trust, ethics, and system integration. Successful adoption requires user‐centered design, ethical safeguards, and seamless healthcare integration to ensure safe,
Dipak Chandra Das +9 more
wiley +1 more source
A Neural Network-Based Approach for Cryptographic Function Detection in Malware
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia +5 more
doaj +1 more source
AI in chemical engineering: From promise to practice
Abstract Artificial intelligence (AI) in chemical engineering has moved from promise to practice: physics‐aware (gray‐box) models are gaining traction, reinforcement learning complements model predictive control (MPC), and generative AI powers documentation, digitization, and safety workflows.
Jia Wei Chew +4 more
wiley +1 more source
Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework
Fuzzing is widely utilized as a practical test method to determine unknown vulnerabilities in software. Although fuzzing shows excellent results for code coverage and crash count, it is not easy to apply these effects to library fuzzing. A library cannot
Sanghoon Jeon +3 more
doaj +1 more source
A Characterization of Cybersecurity Posture from Network Telescope Data [PDF]
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013.
Xu, Maochao, Xu, Shouhuai, Zhan, Zhenxin
core
Abstract This study investigates a fault‐tolerant control (FTC) approach for continuous stirred‐tank reactors (CSTR), emphasizing the importance of timely interventions to ensure operational safety under fault conditions. A systematic methodology combining residual‐based fault estimation and Dynamic Safety Margin (DSM) monitoring is developed to guide ...
Pu Du +3 more
wiley +1 more source
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li +5 more
doaj +1 more source

