Results 31 to 40 of about 10,182 (242)

A Study on a Scenario-Based Security Incident Prediction System for Cybersecurity

open access: yesApplied Sciences
In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace.
Yong-Joon Lee
doaj   +1 more source

Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

open access: yesComputers, 2023
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of ...
Noura A. Mawla, Hussein K. Khafaji
doaj   +1 more source

Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich   +3 more
wiley   +1 more source

Mr. Robot: Schizophrenia, Paranoia and Corporate Greed

open access: yesMedienPädagogik: Zeitschrift für Theorie und Praxis der Medienbildung, 2016
The following essay explores the first season of Mr. Robot (2015 −) that was available at the time of this writing from the position of Deleuzian symptomatology, what he calls the tensions between the ‹clinical and the critical›.
jan jagodzinski
doaj   +1 more source

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups

open access: yesIEEE Access, 2021
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee   +4 more
doaj   +1 more source

Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade

open access: yesAgribusiness, EarlyView.
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley   +1 more source

Thinking with the Animal-Hacker

open access: yesA Peer-Reviewed Journal About, 2013
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj   +1 more source

A Novel Parameter Estimation Method for Pneumatic Soft Hand Control Applying Logarithmic Decrement for Pseudo‐Rigid Body Modeling

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
In this research, a paradigm of parameter estimation method for pneumatic soft hand control is proposed. The method includes the following: 1) sampling harmonic damping waves, 2) applying pseudo‐rigid body modeling and the logarithmic decrement method, and 3) deriving position and force control.
Haiyun Zhang   +4 more
wiley   +1 more source

ChatGPT and Medicine: Together We Embrace the AI Renaissance

open access: yesJMIR Bioinformatics and Biotechnology
The generative artificial intelligence (AI) model ChatGPT holds transformative prospects in medicine. The development of such models has signaled the beginning of a new era where complex biological data can be made more accessible and ...
Sean Hacking
doaj   +1 more source

Child’s Information Security in Digital Space of the Russian Federation

open access: yesРоссийский технологический журнал, 2019
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy