Results 191 to 200 of about 45,766 (284)

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Fault‐Tolerant Fuzzy Boundary Control for Nonlinear Distributed Parameter Systems Under Limited Measurements and Markovian Failures

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li   +5 more
wiley   +1 more source

Social network dynamics under experimental manipulations of predation risk and food abundance in wild rock hyraxes

open access: yesJournal of Animal Ecology, EarlyView.
This study combines replicated experimental manipulation, social network analysis, network permutations and meta‐analysis to disentangle active from spatially‐induced changes in animal network structure in the wild. It reveals that short‐term environmental changes primarily alter space use, with limited effects on social structure.
Camille N. M. Bordes   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy