Results 81 to 90 of about 1,097,826 (233)

State Integration and Violence at the Margins: The Logic of Police Raids in Rio de Janeiro's Favelas

open access: yesThe Howard Journal of Crime and Justice, EarlyView.
ABSTRACT This paper investigates police raids in Rio de Janeiro's favelas through a property rights framework, exploring their organisational structure, motivations and implications. Using data from police reports, academic studies, NGOs and news sources, it examines why and how the state intervenes in these contested spaces.
Joseph Bouchard
wiley   +1 more source

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

Method based on contrastive incremental learning for fine-grained malicious traffic classification

open access: yesTongxin xuebao, 2023
In order to protect against continuously emerging unknown threats, a new method based on contrastive incremental learning for fine-grained malicious traffic classification was proposed.The proposed method was based on variational auto-encoder (VAE) and ...
Yifeng WANG   +6 more
doaj   +2 more sources

“I Paid A Bribe”—Lessons and Insights From Crowdsourced Corruption Reporting in India

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Preventing and reducing corruption has proven to be an enormous challenge. An important step in this process is to produce and use good metrics to identify where anti‐corruption resources would be most beneficial. Most measures of corruption, however, rely on surveys of perceptions or bribery incidence.
Ina Kubbe   +2 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Malicious Traffic Detection on Tofino Using Graph Attention Model

open access: yesApplied Sciences
With the surge of malicious traffic in networks, existing detection methods struggle to balance real-time performance and efficiency. Data plane programmability, as an emerging technology, offers rapid control loops that can more effectively detect and ...
Xichang Gao   +4 more
doaj   +1 more source

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, Volume 56, Issue 4, Page 339-356, April 2026.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

Obfuscated malicious traffic detection based on data enhancement

open access: yesFrontiers in Computer Science
As the proportion of encrypted traffic increases, it becomes increasingly challenging for network attacks to be discovered. Although existing methods combine unencrypted statistical features, e.g., average packet length, with machine learning algorithms ...
Ke Ye   +6 more
doaj   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Clinical Correlates of Compliance, Appeasement and Resistance in Command Hallucinations: A Systematic Review

open access: yesClinical Psychology &Psychotherapy, Volume 33, Issue 2, March/April 2026.
ABSTRACT Objective Command hallucinations (CHs) are a subtype of auditory hallucination commonly observed in psychosis and are strongly associated with harmful behaviours towards the self and others. Despite their clinical relevance, no review has synthesised the clinical variables associated with compliance, appeasement and resistance.
M. Medas, A. Georgiades
wiley   +1 more source

Home - About - Disclaimer - Privacy