Results 101 to 110 of about 1,097,826 (233)

Real‐Time Detection and Prevention of DoS Attack in Unmanned Marine Vehicles Using Machine Learning

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT Unmanned marine vehicles (UMVs) are one of the most crucial components of the underwater communication and surveillance system in the marine and oceanographic environment. This research introduces a novel approach to stabilize the connection in an unstable underwater environment by inheriting features of communication velocities.
Noman Ali   +8 more
wiley   +1 more source

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

SOE: A Multi-Objective Traffic Scheduling Engine for DDoS Mitigation with Isolation-Aware Optimization

open access: yesMathematics
Distributed Denial-of-Service (DDoS) attacks generate deceptive, high-volume traffic that bypasses conventional detection mechanisms. When interception fails, effectively allocating mixed benign and malicious traffic under resource constraints becomes a ...
Mingwei Zhou, Xian Mu, Yanyan Liang
doaj   +1 more source

Abducted by a Terrestrial Alien: Sensory Distortions, Weird Fungi and Aerial Anomalies in a Decrepit Mountain Cabin

open access: yesAnthropology of Consciousness, Volume 37, Issue 1, Spring 2026.
ABSTRACT This account explores how circumstances verging on the other‐worldly alter human perception and consciousness in a fieldwork situation. The case study involves an archaeological field survey team stranded for a time on a remote Lapland mountain.
Aki Hakonen   +2 more
wiley   +1 more source

AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic

open access: yesApplied Sciences
While encryption enhances data security, it also presents significant challenges for network traffic analysis, especially in detecting malicious activities.
Junhao Liu   +4 more
doaj   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

It's Amazing – But Terrifying!: Unveiling the Combined Effect of Emotional and Cognitive Trust on Organizational Member' Behaviours, AI Performance, and Adoption

open access: yesJournal of Management Studies, Volume 63, Issue 2, Page 473-514, March 2026.
Abstract We conducted a qualitative, real‐life study where we tracked the introduction, implementation, and use of a new AI technology in a company. We identified four distinct trust configurations among organizational members: full trust (high cognitive/high emotional), full distrust (low cognitive/low emotional), uncomfortable trust (high cognitive ...
Natalia Vuori   +2 more
wiley   +1 more source

WebEye - Automated Collection of Malicious HTTP Traffic

open access: yes, 2018
Software implementation description, dataset, machine learning, 11 ...
Vierthaler, Johann   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy