AI-Driven Cybersecurity in IoT: Adaptive Malware Detection and Lightweight Encryption via TRIM-SEC Framework. [PDF]
Mutambik I.
europepmc +1 more source
Nigericin‐Triggered Phosphodynamics in Inflammasome Formation and Pyroptosis
ABSTRACT Innate immune signaling relies heavily on phosphorylation cascades to mount effective immune responses. Although traditional innate immune signaling cascades following TLR4 stimulation have been investigated through a temporally quantitative phosphoproteomic lens, far fewer studies have applied these methods to distinct signaling following the
Vanya Bhushan +5 more
wiley +1 more source
D3O-IIoT: deep reinforcement learning-driven dynamic deception orchestration for industrial IoT security. [PDF]
Wushishi U +5 more
europepmc +1 more source
ABSTRACT Protein S‐palmitoylation, a reversible lipid modification, plays critical roles in regulating protein function and localization. However, its comprehensive role in the rapid reprogramming of macrophages during early immune responses remains incompletely understood.
Hyojung Kim +4 more
wiley +1 more source
Elevating intrusion detection and security fortification in intelligent networks through cutting-edge machine learning paradigms. [PDF]
Munna MMI +4 more
europepmc +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems. [PDF]
Şahin CB.
europepmc +1 more source
Generative AI—the Transgression of Technology
ABSTRACT This article offers a systems‐theoretical analysis of generative artificial intelligence (GenAI) grounded in Niklas Luhmann's sociology of technology. It addresses a central conceptual problem: How GenAI can be understood within a theoretical framework that has traditionally defined technology as a means of stabilising action through causal ...
Jesper Tække
wiley +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley +1 more source

