Results 31 to 40 of about 10,182 (242)
A Study on a Scenario-Based Security Incident Prediction System for Cybersecurity
In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace.
Yong-Joon Lee
doaj +1 more source
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of ...
Noura A. Mawla, Hussein K. Khafaji
doaj +1 more source
Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich +3 more
wiley +1 more source
Mr. Robot: Schizophrenia, Paranoia and Corporate Greed
The following essay explores the first season of Mr. Robot (2015 −) that was available at the time of this writing from the position of Deleuzian symptomatology, what he calls the tensions between the ‹clinical and the critical›.
jan jagodzinski
doaj +1 more source
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee +4 more
doaj +1 more source
Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley +1 more source
Thinking with the Animal-Hacker
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj +1 more source
In this research, a paradigm of parameter estimation method for pneumatic soft hand control is proposed. The method includes the following: 1) sampling harmonic damping waves, 2) applying pseudo‐rigid body modeling and the logarithmic decrement method, and 3) deriving position and force control.
Haiyun Zhang +4 more
wiley +1 more source
ChatGPT and Medicine: Together We Embrace the AI Renaissance
The generative artificial intelligence (AI) model ChatGPT holds transformative prospects in medicine. The development of such models has signaled the beginning of a new era where complex biological data can be made more accessible and ...
Sean Hacking
doaj +1 more source
Child’s Information Security in Digital Space of the Russian Federation
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov +2 more
doaj +1 more source

