Results 51 to 60 of about 181,953 (301)

Dual Entropy Source Physical Unclonable Functions of Reconfigurable Feedback Field‐Effect Transistors with Polycrystalline Silicon Channels

open access: yesAdvanced Intelligent Systems, EarlyView.
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park   +4 more
wiley   +1 more source

Domain knowledge free cloud-IDS with lightweight embedding method

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
The expansion of the cloud computing market has provided a breakthrough in efficiently storing and managing data for individuals and companies. As personal and corporate data move to the cloud, diverse attacks targeting the cloud have also increased for ...
Yongsik Kim, Gunho Park, Huy Kang Kim
doaj   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Leveraging Artificial Intelligence for ESG Reporting: A Case Study in the European Fashion Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The fashion industry in Europe has increasingly recognized the importance of Environmental, Social, and Governance (ESG) reporting as a key driver for sustainable development and transparency. As consumer awareness grows and regulatory frameworks evolve, companies are pressured to disclose their sustainability practices, ethical labor ...
Serena Strazzullo   +5 more
wiley   +1 more source

A Subjective Expressions Extracting Method for Social Opinion Mining

open access: yesDiscrete Dynamics in Nature and Society, 2020
Opinion mining plays an important role in public opinion monitoring, commodity evaluation, government governance, and other areas. One of the basic tasks of opinion mining is to extract the expression elements, which can be further divided into direct ...
Mingyong Yin   +4 more
doaj   +1 more source

ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM

open access: yesArena Hukum, 2022
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order.
Safrida Ananda, Ika Putranti, Andi Dir
doaj   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Connecting Industry 4.0, Servitisation and Sustainability: Territorial Implications for Global Value Chains

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Globalisation has deepened the integration of international production within global value chains (GVCs), where the various stages of the manufacturing process are dispersed across countries. In today's volatile business environment, characterised by rapid technological advances (Industry 4.0) and evolving consumer preferences towards use ...
Javier Bilbao‐Ubillos   +3 more
wiley   +1 more source

Exploring the talent training mode of “cybersecurity doctor”

open access: yes网络与信息安全学报, 2019
The competition for cyber security is ultimately the competition of talents. Countries around the world have placed cyber security talents at the national strategic level.
CHEN Xingshu, WANG Haizhou, RUAN Shuhua   +2 more
doaj   +1 more source

Understanding the MSME Environmental Transition: Nonlinear and Moderation Effects of Digitalization and Institutional Context

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The necessary environmental transition involves a substantial challenge for micro, small, and medium‐sized enterprises (MSMEs). Moreover, in the Ibero‐American context, it is even more challenging. Our study aims to shed light on the scarce and inconclusive evidence in this regard, analyzing the influence of digitalization, given its inclusion
José Antonio Clemente‐Almendros   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy