Results 261 to 270 of about 66,369 (329)
This study combines replicated experimental manipulation, social network analysis, network permutations and meta‐analysis to disentangle active from spatially‐induced changes in animal network structure in the wild. It reveals that short‐term environmental changes primarily alter space use, with limited effects on social structure.
Camille N. M. Bordes +6 more
wiley +1 more source
TopoSleuth, a decoy-based multi-layered defense framework for securing SDN topology discovery. [PDF]
Shoaib M +4 more
europepmc +1 more source
Integrating comparative spectrometry, image analysis, and thermal modeling, we reveal that (1) females optimize crypsis via background matching, (2) males prioritize high‐contrast disruptive patterning at a significant thermoregulatory cost (reduced solar heat gain), and (3) habitat‐specific monomorphism in Diploderma slowinskii underscores ecological ...
Yuning Cao, Lin Shi, Yin Qi
wiley +1 more source
Digital Twin-Driven Intrusion Detection for Industrial SCADA: A Cyber-Physical Case Study. [PDF]
Sayghe A.
europepmc +1 more source
Adaptive Quantized Control for Markov Jump Systems Against Multimode False Data Injection Attack
Yu Huang, Bei Chen, Yugang Niu
openalex +1 more source
Graph-based federated learning approach for intrusion detection in IoT networks. [PDF]
Al Tfaily F +5 more
europepmc +1 more source
Fed-DTCN: A Federated Disentangled Learning Framework for Unsupervised Zero-Day Anomaly Detection in IoT with Semantic-Aware Augmentation. [PDF]
Khan MA, Khalid O, Rais RNB.
europepmc +1 more source
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source

