Results 41 to 50 of about 164,979 (324)

Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis

open access: yesIEEE Access, 2023
Continuous Wavelet Transform (CWT) is rarely used in the field of side-channel analysis due to problems related to parameter (wavelet scale) selection; There is no way to find the optimal wavelet scale other than an exhaustive search, and the resulting ...
Daehyeon Bae   +6 more
doaj   +1 more source

Cybersecurity and Sustainable Development

open access: yesProcedia Computer Science, 2021
Growing interdependencies between organizations lead them towards the creation of inter-organizational networks where cybersecurity and sustainable development have become one of the most important issues. The Environmental Goods and Services Sector (EGSS) is one of the fastest developing sectors of economy fueled by the growing relationships between
Sulich, Adam   +4 more
openaire   +3 more sources

Photonic Nanomaterials for Wearable Health Solutions

open access: yesAdvanced Materials, EarlyView.
This review discusses the fundamentals and applications of photonic nanomaterials in wearable health technologies. It covers light‐matter interactions, synthesis, and functionalization strategies, device assembly, and sensing capabilities. Applications include skin patches and contact lenses for diagnostics and therapy. Future perspectives emphasize AI‐
Taewoong Park   +3 more
wiley   +1 more source

A Characterization of Cybersecurity Posture from Network Telescope Data [PDF]

open access: yes, 2016
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013.
Xu, Maochao, Xu, Shouhuai, Zhan, Zhenxin
core  

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

A Subjective Expressions Extracting Method for Social Opinion Mining

open access: yesDiscrete Dynamics in Nature and Society, 2020
Opinion mining plays an important role in public opinion monitoring, commodity evaluation, government governance, and other areas. One of the basic tasks of opinion mining is to extract the expression elements, which can be further divided into direct ...
Mingyong Yin   +4 more
doaj   +1 more source

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

A Fuzzy Risk Assessment Approach Based on Z‐Numbers for Enhancing Safety and Human‐Robot Collaboration in Automotive Sector

open access: yesAdvanced Intelligent Systems, EarlyView.
A novel risk assessment approach that integrates the fuzzy set theory and Z‐numbers with multicriteria decision‐making techniques (Delphi, decision‐making trial and evaluation laboratory, analytic network process, and VIseKriterijumska Optimizacija I Kompromisno Resenje) to manage uncertainty and prioritize human–robot collaboration risks. A real‐world
Emine Bozkus, İhsan Kaya
wiley   +1 more source

Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks

open access: yesSensors, 2019
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources.
Liang Liu, Wen Chen, Tao Li, Yuling Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy