A self-evolution cyber attack scheme generation system for cybersecurity evaluation. [PDF]
Yang M +6 more
europepmc +1 more source
Resilience Practices and Post‐Traumatic Growth Among Sudanese IDPs
ABSTRACT In this paper we examine the resilience of internally displaced persons (IDPs) in Sudan who have endured various forms of suffering resulting from being targeted or trapped by militants involved in large‐scale violence. Upon escaping the conflict zones, the civilians exhibit strength, adaptability, and wisdom in the face of various threats to ...
Karina Korostelina +2 more
wiley +1 more source
Analyzing the persuasion mechanism of AI-generated rumors via the elaboration likelihood model. [PDF]
Hou Z.
europepmc +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
OntoSecAI: Ontology-driven security automation for AI-enabled systems. [PDF]
Ullah U, Haleem M, Ullah A.
europepmc +1 more source
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza +2 more
wiley +1 more source
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
Risk Assessment Method for CPS-Based Distributed Generation Cluster Control in Active Distribution Networks Under Cyber Attacks. [PDF]
Ouyang J, Mo F, Huang F, Chen Y.
europepmc +1 more source
Recent advances in boosting interfacial bubble dynamics with external fields
External physical fields, including acoustic, magnetic, thermal, mechanical, and optical stimuli, accelerate the entire bubble‐dynamics sequence of nucleation, growth, and detachment. Abstract The efficiency of industrial electrocatalytic reactions depends not only on generating gaseous products but also on their detachment from the catalyst surface ...
Wenlu Xie +5 more
wiley +1 more source
A Data Rate Monitoring Approach for Cyberattack Detection in Digital Twin Communication. [PDF]
Rodrigues C +3 more
europepmc +1 more source

