Results 201 to 210 of about 66,758 (286)
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley +1 more source
Oncotarget: Past, Present and Future: Trends in the publishing industry. [PDF]
Scientific Integrity Office at Oncotarget.
europepmc +1 more source
Seam Carving Forgery Detection Through Multi-Perspective Explainable AI. [PDF]
Neves MJD +5 more
europepmc +1 more source
LLM‐Assisted Topic Modelling for Hate Speech Characterization
ABSTRACT In the digital era, the internet and social media have transformed communication but have also facilitated the spread of hate speech and disinformation, leading to radicalization, polarisation and toxicity. This is especially concerning for media outlets due to their significant role in shaping public discourse. This study examines the topics,
Alejandro Buitrago López +2 more
wiley +1 more source
Tencent Meeting forensics based on memory reverse analysis. [PDF]
Yu S +6 more
europepmc +1 more source
ABSTRACT Marine mammal strandings can provide unique and valuable insights into individual and population health, ranging from infectious diseases to anthropogenic threats. However, the level of decomposition of carcasses can interfere with the assessment of important indicators, such as an individual's nutritional status.
Lara Bennati‐Madureira +8 more
wiley +1 more source
Animal Anatomy Teaching: New Concepts, Innovations and Applications. [PDF]
Choudhary OP.
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
A quantum resilient deepfake detection framework using enhanced resnext and post quantum cryptography defence. [PDF]
Shreeya KN +5 more
europepmc +1 more source
Forensic analysis and evaluation of file-wiping applications in Android OS. [PDF]
Oh DB +6 more
europepmc +1 more source

