Results 91 to 100 of about 26,192 (199)

Formal Approach to Safety‐Driven Dynamic Procedure Modeling

open access: yesSystems Engineering, EarlyView.
ABSTRACT Ensuring the safety of unmanned aerial systems (UAS) is a growing concern as the number of UAS grows increasingly fast. Regulatory bodies are in the process of tackling this problem by issuing standards and recommendations to be met by UAS designers.
Jean‐Charles Chaudemar   +3 more
wiley   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

Chronic Wasting Disease management responses in North America: A public policy analysis

open access: yesWildlife Society Bulletin, EarlyView.
In this study we use the Multiple Streams Framework from public policy theory to assess the responses of wildlife management agencies in states and provinces with CWD‐positive cases in the United States and Canada to alleviate public concerns and manage the spread of this disease.
Kelly H. Dunning   +12 more
wiley   +1 more source

BioLogical: a universal analysis framework for biosystem logical dynamics. [PDF]

open access: yesComput Struct Biotechnol J
Yao Y, Liu D, Zhang Z, Zhao C, Pei D.
europepmc   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy