Results 121 to 130 of about 233,719 (314)
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Rethinking Face‐to‐Face Interaction: Lessons from Studies of “Autistic Sociality”
Face‐to‐face interaction is a foundational concept in microsociology. This article surveys the social experiences of autistic people, who are commonly known for having a strained relationship with interactions face to face. By interpretively reviewing and synthesizing the broader literature on “autistic sociality,” the article provides a nuanced ...
Lars E. F. Johannessen
wiley +1 more source
A Systems Engineering Methodology for System of Autonomous Systems: Architecture and Integration
ABSTRACT Artificial intelligence and machine learning (AI/ML) rapidly transform systems by providing autonomous capabilities. This new class of systems can become a constituent system in a system of systems (SoS) to evolve it into a system of autonomous systems (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley +1 more source
Tech communities are groups that come together to engage with particular technologies. In describing two instances of such communities—hacker- and makerspaces in the United States, and the crafting activities of peasant movements in Colombia—we explore ...
Fredy Mora-Gámez, Sarah R. Davies
doaj
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
Jean-Paul A. Yaacoub +3 more
semanticscholar +1 more source
Abstract Considering applied linguistics as a problem‐centered discipline, we address an enduring challenge in the field: the need to ensure that research provides findings that can contribute to solving everyday challenges faced by language practitioners.
Hyun‐Bin Hwang, Matthew D. Coss
wiley +1 more source
A very deep IRAS survey at l(II) = 97 deg, b(II) = +30 deg [PDF]
A deep far-infrared survey is presented using over 1000 scans made of a 4 to 6 sq. deg. field at the north ecliptic pole by the IRAS. Point sources from this survey are up to 100 times fainter than the IRAS point source catalog at 12 and 25 micrometers ...
Hacking, Perry, Houck, James R.
core +1 more source
DNA metabarcoding reveals wolf dietary patterns in the northern Alps and Jura Mountains
Understanding predator–prey interactions is crucial for wildlife management and human–wildlife coexistence, particularly in multi‐use landscapes such as western Europe. As wolves Canis lupus recolonize their former habitats, knowledge of their diet is essential for conservation, management and public acceptance.
Florin Kunz +6 more
wiley +1 more source
HACKING THE CITY A SOMEWHAT DIFFERENT MODE OF FIELD WORK
Guerilla Gardening, Reclaim the street, Adbusting and others are characteristic forms of temporary appropriation of public spaces. Those have become a global trend.
Romy HOFMANN, Martina MEHREN
doaj +2 more sources
Cybersecurity Risks: Are They Inflated? [PDF]
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj

