Results 91 to 100 of about 4,077 (204)
HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o +3 more
wiley +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
f‐Block Element‐Based MOF Thin Films: A Platform for Luminescence, Sensing, and Energy Applications
f‐Block element–based metal–organic framework (f‐MOF) thin films offer exceptional potential for luminescent, sensing, and energy‐related applications. This review surveys recent progress in their synthesis, characterization, and functional implementation, emphasizing the diversity of available thin‐film fabrication strategies. The convergence of these
Dong‐Hui Chen, Christof Wöll
wiley +1 more source
A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley +1 more source
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
ABSTRACT Background The preschool years (ages 3–5) represent a critical window for promoting development and lifelong health. However, in many low‐resource settings, developmental delays, sensory impairments and emerging health risks often go undetected.
Robyn Smith +12 more
wiley +1 more source
Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great dispersion, inability to classify traffic with multi ...
Xuyang Jing +4 more
doaj +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Traffic concealed data detection method based on contrastive learning and pre-trained Transformer
To solve the problems of characterizing representing massive encrypted traffic, perceiving malicious behaviors, and identifying the ownership of privacy data, a traffic concealed data detection method was proposed based on contrastive learning and pre ...
HE Shuai +5 more
doaj

