Results 171 to 180 of about 46,655 (287)

Normalizing the Shamed Self: Stigma, Neutralization and “Narrative Credibility” in Interviews on White‐Collar Transgression

open access: yesSymbolic Interaction, EarlyView.
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Graph-based federated learning approach for intrusion detection in IoT networks. [PDF]

open access: yesSci Rep
Al Tfaily F   +5 more
europepmc   +1 more source

Effect of ‘combing’ on intramuscular sedation in pigs in a clinical setting—A randomised trial

open access: yesVeterinary Record, EarlyView.
Abstract Background Pigs pose distinct challenges to the anaesthetist due to their temperament, the limitations of manual restraint and species‐specific anatomical features. Despite the importance of minimising stress during clinical procedures, gentle handling techniques tailored for pigs in a clinical setting have yet to be clearly described or ...
Kaitlynn C. Ban   +5 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy