Results 121 to 130 of about 233,719 (314)

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Rethinking Face‐to‐Face Interaction: Lessons from Studies of “Autistic Sociality”

open access: yesSymbolic Interaction, EarlyView.
Face‐to‐face interaction is a foundational concept in microsociology. This article surveys the social experiences of autistic people, who are commonly known for having a strained relationship with interactions face to face. By interpretively reviewing and synthesizing the broader literature on “autistic sociality,” the article provides a nuanced ...
Lars E. F. Johannessen
wiley   +1 more source

A Systems Engineering Methodology for System of Autonomous Systems: Architecture and Integration

open access: yesSystems Engineering, EarlyView.
ABSTRACT Artificial intelligence and machine learning (AI/ML) rapidly transform systems by providing autonomous capabilities. This new class of systems can become a constituent system in a system of systems (SoS) to evolve it into a system of autonomous systems (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Afterlives of the Californian Ideology| More-Than-Tech Communities: Alternative Imaginaries Within Hacking and Crafting

open access: yesInternational Journal of Communication, 2023
Tech communities are groups that come together to engage with particular technologies. In describing two instances of such communities—hacker- and makerspaces in the United States, and the crafting activities of peasant movements in Colombia—we explore ...
Fredy Mora-Gámez, Sarah R. Davies
doaj  

Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

open access: yesInternet of Things and Cyber-Physical Systems, 2023
Jean-Paul A. Yaacoub   +3 more
semanticscholar   +1 more source

A Proposal to Center Relevance in Applied Linguistics Research: The Relevance‐to‐Practice (RTP) Framework

open access: yesTESOL Quarterly, EarlyView.
Abstract Considering applied linguistics as a problem‐centered discipline, we address an enduring challenge in the field: the need to ensure that research provides findings that can contribute to solving everyday challenges faced by language practitioners.
Hyun‐Bin Hwang, Matthew D. Coss
wiley   +1 more source

A very deep IRAS survey at l(II) = 97 deg, b(II) = +30 deg [PDF]

open access: yes
A deep far-infrared survey is presented using over 1000 scans made of a 4 to 6 sq. deg. field at the north ecliptic pole by the IRAS. Point sources from this survey are up to 100 times fainter than the IRAS point source catalog at 12 and 25 micrometers ...
Hacking, Perry, Houck, James R.
core   +1 more source

DNA metabarcoding reveals wolf dietary patterns in the northern Alps and Jura Mountains

open access: yesWildlife Biology, EarlyView.
Understanding predator–prey interactions is crucial for wildlife management and human–wildlife coexistence, particularly in multi‐use landscapes such as western Europe. As wolves Canis lupus recolonize their former habitats, knowledge of their diet is essential for conservation, management and public acceptance.
Florin Kunz   +6 more
wiley   +1 more source

HACKING THE CITY A SOMEWHAT DIFFERENT MODE OF FIELD WORK

open access: yesEuropean Journal of Geography, 2012
Guerilla Gardening, Reclaim the street, Adbusting and others are characteristic forms of temporary appropriation of public spaces. Those have become a global trend.
Romy HOFMANN, Martina MEHREN
doaj   +2 more sources

Cybersecurity Risks: Are They Inflated? [PDF]

open access: yesSalus Journal, 2016
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj  

Home - About - Disclaimer - Privacy