Results 81 to 90 of about 10,483 (192)
A Cross‐Disciplinary Analysis of AI Policies in Academic Peer Review
ABSTRACT Rapid advances of artificial intelligence (AI) have substantially impacted the field of academic publishing. This study examines AI integration in peer review by analysing policies from 439 high‐ and 363 middle‐impact factor (IF) journals across disciplines. Using grounded theory, we identify patterns in AI policy adoption. Results show 83% of
Zhongshi Wang, Mengyue Gong
wiley +1 more source
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities.
Mohamed Chahine Ghanem +4 more
doaj +1 more source
Secure management of logs in internet of things [PDF]
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core
Event Log Correlation for Multi‐Step Attack Detection
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat +2 more
wiley +1 more source
The Role of Digital Twin for Space and Remote Terrestrial Construction
This article explores digital twin technology's critical role in construction for extreme environments, including space habitats and remote terrestrial infrastructure. It highlights strategic advantages, discusses essential governance and policy frameworks, and identifies emerging technological trends, emphasising the transformative potential for ...
Ehsan Noroozinejad Farsangi
wiley +1 more source
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
IoT Forensics: Challenges For The IoA Era [PDF]
Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks.
Baker, T, Mac Dermott, AM, Shi, Q
core
A Case Study for an «Accountable» IoT Forensics
IoT (Internet of Things) promise great potentials but pose many concerns. Billions of devices connected in global networks exchanging enormous amounts of data, indeed, can be highly vulnerable. Accountability is a crucial feature to foster awareness and reduce risks at all levels, yet it is diffi cult to put in practice when it comes to evaluate ...
GALVAN, Fausto +2 more
openaire +2 more sources
Parameter Sensitivity Test and Audio Encryption Scheme Design for Multimedia Information Security
With the continuous development of information technology, multimedia information faces many security threats. To realize efficient multimedia information processing under the premise of guaranteeing information security, this research analyzes and extracts the parameters of different kinds of information in view of the fact that each of them has ...
Ming Yin, Shi Tang, Deepali
wiley +1 more source

