Results 51 to 60 of about 157,721 (269)
Abstract Health care is shifting towards a digital‐guided system, integrating digital diagnostics, biomarkers and therapeutics in many care pathways. However, despite rapid technological advancement and preliminary adoption accelerated by the COVID‐19 pandemic, a significant implementation gap persists. This narrative review explores the causes of this
Mees H. P. Stoop +3 more
wiley +1 more source
Domain knowledge free cloud-IDS with lightweight embedding method
The expansion of the cloud computing market has provided a breakthrough in efficiently storing and managing data for individuals and companies. As personal and corporate data move to the cloud, diverse attacks targeting the cloud have also increased for ...
Yongsik Kim, Gunho Park, Huy Kang Kim
doaj +1 more source
RWU Cybersecurity Expert Works on State Initiative to Combat Cyber Threats [PDF]
As a founding member of the state\u27s Joint Cyber Task Force, RWU Cybersecurity Program Director Douglas White battles cyber disruptions in R.I.
Siliezar, Juan
core +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources.
Liang Liu, Wen Chen, Tao Li, Yuling Liu
doaj +1 more source
Cybersecurity in the Classroom: Bridging the Gap Between Computer Access and Online Safety [PDF]
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These
Malecki, Andrew
core +2 more sources
A Business Framework for Product Take‐Back—A Structured Multiple‐Case Analysis
ABSTRACT The potential of take‐back systems remains largely unrealized as initiatives have proven difficult to implement in practice. The question is why we do not see more take‐back systems given the substantial environmental benefits. We try to understand the challenges and stumbling blocks in setting up take‐back from a business perspective.
Rasmus Jørgensen, Torben Pedersen
wiley +1 more source
A Subjective Expressions Extracting Method for Social Opinion Mining
Opinion mining plays an important role in public opinion monitoring, commodity evaluation, government governance, and other areas. One of the basic tasks of opinion mining is to extract the expression elements, which can be further divided into direct ...
Mingyong Yin +4 more
doaj +1 more source
The future of Cybersecurity in Italy: Strategic focus area [PDF]
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential.
Anglano, C. +130 more
core
ABSTRACT The critical role of small and medium‐sized enterprises (SMEs) in driving economic growth through employment generation and innovation cannot go unseen, especially the efforts of small firms in promoting sustainable entrepreneurship. With more market and consumer focus on sustainability and the shift toward eco‐friendly products, SMEs can ...
Nasser Hadi Alajmi
wiley +1 more source

