Results 81 to 90 of about 10,483 (192)

A Cross‐Disciplinary Analysis of AI Policies in Academic Peer Review

open access: yesLearned Publishing, Volume 39, Issue 1, January 2026.
ABSTRACT Rapid advances of artificial intelligence (AI) have substantially impacted the field of academic publishing. This study examines AI integration in peer review by analysing policies from 439 high‐ and 363 middle‐impact factor (IF) journals across disciplines. Using grounded theory, we identify patterns in AI policy adoption. Results show 83% of
Zhongshi Wang, Mengyue Gong
wiley   +1 more source

Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine

open access: yesIoT
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities.
Mohamed Chahine Ghanem   +4 more
doaj   +1 more source

Secure management of logs in internet of things [PDF]

open access: yes, 2015
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core  

Event Log Correlation for Multi‐Step Attack Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat   +2 more
wiley   +1 more source

The Role of Digital Twin for Space and Remote Terrestrial Construction

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
This article explores digital twin technology's critical role in construction for extreme environments, including space habitats and remote terrestrial infrastructure. It highlights strategic advantages, discusses essential governance and policy frameworks, and identifies emerging technological trends, emphasising the transformative potential for ...
Ehsan Noroozinejad Farsangi
wiley   +1 more source

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques

open access: yesIET Software, Volume 2026, Issue 1, 2026.
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar   +4 more
wiley   +1 more source

IoT Forensics: Challenges For The IoA Era [PDF]

open access: yes
Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks.
Baker, T, Mac Dermott, AM, Shi, Q
core  

A Case Study for an «Accountable» IoT Forensics

open access: yesJusletter-IT, 2020
IoT (Internet of Things) promise great potentials but pose many concerns. Billions of devices connected in global networks exchanging enormous amounts of data, indeed, can be highly vulnerable. Accountability is a crucial feature to foster awareness and reduce risks at all levels, yet it is diffi cult to put in practice when it comes to evaluate ...
GALVAN, Fausto   +2 more
openaire   +2 more sources

Parameter Sensitivity Test and Audio Encryption Scheme Design for Multimedia Information Security

open access: yesInternational Journal of Digital Multimedia Broadcasting, Volume 2026, Issue 1, 2026.
With the continuous development of information technology, multimedia information faces many security threats. To realize efficient multimedia information processing under the premise of guaranteeing information security, this research analyzes and extracts the parameters of different kinds of information in view of the fact that each of them has ...
Ming Yin, Shi Tang, Deepali
wiley   +1 more source

Home - About - Disclaimer - Privacy