Results 31 to 40 of about 157,721 (269)

Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads

open access: yesApplied Sciences, 2020
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yong Fang   +3 more
doaj   +1 more source

Institutional Strategies for Cybersecurity in Higher Education Institutions

open access: yesInformation, 2022
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj   +1 more source

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security [PDF]

open access: yes, 2016
[Excerpt] This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: (1) initiatives to define and identify the federal cybersecurity workforce, and (2)
Francis, Kathryn A, Ginsberg, Wendy
core   +2 more sources

The Role of Artificial Intelligence in Medication Management for Older Adults: A Systematic Review

open access: yesAGING MEDICINE, EarlyView.
Artificial intelligence enhances medication management for older adults by improving adherence, personalizing treatment, and predicting risks. Despite benefits, challenges remain in usability, trust, ethics, and system integration. Successful adoption requires user‐centered design, ethical safeguards, and seamless healthcare integration to ensure safe,
Dipak Chandra Das   +9 more
wiley   +1 more source

A Neural Network-Based Approach for Cryptographic Function Detection in Malware

open access: yesIEEE Access, 2020
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia   +5 more
doaj   +1 more source

AI in chemical engineering: From promise to practice

open access: yesAIChE Journal, EarlyView.
Abstract Artificial intelligence (AI) in chemical engineering has moved from promise to practice: physics‐aware (gray‐box) models are gaining traction, reinforcement learning complements model predictive control (MPC), and generative AI powers documentation, digitization, and safety workflows.
Jia Wei Chew   +4 more
wiley   +1 more source

Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework

open access: yesIEEE Access, 2022
Fuzzing is widely utilized as a practical test method to determine unknown vulnerabilities in software. Although fuzzing shows excellent results for code coverage and crash count, it is not easy to apply these effects to library fuzzing. A library cannot
Sanghoon Jeon   +3 more
doaj   +1 more source

A Characterization of Cybersecurity Posture from Network Telescope Data [PDF]

open access: yes, 2016
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013.
Xu, Maochao, Xu, Shouhuai, Zhan, Zhenxin
core  

Model‐based fault diagnosis and fault tolerant control in safety‐critical chemical reactors: An experimental study

open access: yesAIChE Journal, EarlyView.
Abstract This study investigates a fault‐tolerant control (FTC) approach for continuous stirred‐tank reactors (CSTR), emphasizing the importance of timely interventions to ensure operational safety under fault conditions. A systematic methodology combining residual‐based fault estimation and Dynamic Safety Margin (DSM) monitoring is developed to guide ...
Pu Du   +3 more
wiley   +1 more source

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach

open access: yesIEEE Access, 2019
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy