Results 241 to 250 of about 79,967 (299)

Laws, Enforcement, and Strategy: A Multi‐Layered Qualitative Study of Multinational Enterprise Compliance Under European Union and Chinese Data Protection Regimes

open access: yesPolicy &Internet, Volume 18, Issue 2, June 2026.
ABSTRACT In an era of proliferating but divergent data protection regimes, the European Union's rights‐based approach and China's sovereignty‐centric model have become two dominant poles of global data governance. This article examines how multinational enterprises navigate compliance under these dual systems and how that compliance is shaped through ...
Yiping Cao
wiley   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Knowledge Graphs and Critical Infrastructures: Friends or Foes?

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
Conceptual overview of Knowledge Graph integration in Critical Infrastructures, illustrating interconnected systems, data flows, and their role in enhancing resilience and operational intelligence. ABSTRACT Knowledge Graphs (KGs) are a natural evolution of data models representing and connecting data in a network of nodes and relations.
José Miguel Blanco   +3 more
wiley   +1 more source

Detection of disturbances and cyber-attacks in smart grids using explainable machine learning. [PDF]

open access: yesSci Rep
Farsi M   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy