Formal Approach to Safety‐Driven Dynamic Procedure Modeling
ABSTRACT Ensuring the safety of unmanned aerial systems (UAS) is a growing concern as the number of UAS grows increasingly fast. Regulatory bodies are in the process of tackling this problem by issuing standards and recommendations to be met by UAS designers.
Jean‐Charles Chaudemar +3 more
wiley +1 more source
BHT-QAOA: The Generalization of Quantum Approximate Optimization Algorithm to Solve Arbitrary Boolean Problems as Hamiltonians. [PDF]
Al-Bayaty A, Perkowski M.
europepmc +1 more source
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source
Integer linear programming for contrasting state interventions in Boolean networks. [PDF]
Bampos C, Megalooikonomou V.
europepmc +1 more source
Chronic Wasting Disease management responses in North America: A public policy analysis
In this study we use the Multiple Streams Framework from public policy theory to assess the responses of wildlife management agencies in states and provinces with CWD‐positive cases in the United States and Canada to alleviate public concerns and manage the spread of this disease.
Kelly H. Dunning +12 more
wiley +1 more source
BioLogical: a universal analysis framework for biosystem logical dynamics. [PDF]
Yao Y, Liu D, Zhang Z, Zhao C, Pei D.
europepmc +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Quantum-like representation of neuronal networks' activity: modeling "mental entanglement". [PDF]
Khrennikov A, Yamada M.
europepmc +1 more source
Extending Kolmogorov's Axioms for a Generalized Probability Theory on Collections of Contexts. [PDF]
Svozil K.
europepmc +1 more source
YOLO11s-UAV: An Advanced Algorithm for Small Object Detection in UAV Aerial Imagery. [PDF]
Mi Q, Chao J, Chen A, Zhang K, Lai J.
europepmc +1 more source

