Results 71 to 80 of about 181,953 (301)

The Influence Maximization in Complex Networks: Significant Trends, Leading Contributors, and Prospective Directions

open access: yesComplexity
Influence maximization (IM) is a concept in social network analysis and data science that focuses on finding the most influential nodes (people, users, etc.) in a network to maximize the spread of information, behavior, or influence.
Elaf Adel Abbas   +4 more
doaj   +1 more source

Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation

open access: yesIEEE Access
The rapid growth of the crypto asset industry has led to the adoption of proof of reserves (PoR) protocols for transparency in centralized exchanges (CEXs).
Beomjoong Kim   +3 more
doaj   +1 more source

Walking the Tightrope of Sustainability Reporting Standardization: Insights From Italian Small and Medium‐Sized Enterprises

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study investigates the challenges and support needs of small and medium‐sized enterprises (SMEs) in adopting standardized sustainability reporting, taking the European Sustainability Reporting Standards (ESRS) as an empirical case of formal standardization.
Filippo Cavaliere   +2 more
wiley   +1 more source

Parametric design method of building structured cabling system oriented to data mining

open access: yesIET Networks, EarlyView., 2022
This paper puts forward the method of secondary development and design software through the research of building structured cabling system (SCS), and uses data mining technology to carry out parametric design of building SCS. Then, the feasibility of the design is tested by comparing the data of the traditional design and the parametric design ...
Bing Wang, Wei Yue
wiley   +1 more source

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

Investigation of Attitudes Towards Security Behaviors [PDF]

open access: yes, 2018
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core   +1 more source

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Elevator dynamic monitoring and early warning system based on machine learning algorithm

open access: yesIET Networks, EarlyView., 2022
In order to monitor and warn the elevator dynamics, in this work, the machine learning algorithm is introduced, and the particle swarm algorithm is used to perfect the model. The model is optimised, and the experimental comparison shows that the optimisation of the model parameters can further improve the accuracy of the elevator load prediction. Then,
Shuai Zhang, Qiangguo Yin, Jinlong Wang
wiley   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy