Results 91 to 100 of about 4,251 (194)

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

It's Amazing – But Terrifying!: Unveiling the Combined Effect of Emotional and Cognitive Trust on Organizational Member' Behaviours, AI Performance, and Adoption

open access: yesJournal of Management Studies, Volume 63, Issue 2, Page 473-514, March 2026.
Abstract We conducted a qualitative, real‐life study where we tracked the introduction, implementation, and use of a new AI technology in a company. We identified four distinct trust configurations among organizational members: full trust (high cognitive/high emotional), full distrust (low cognitive/low emotional), uncomfortable trust (high cognitive ...
Natalia Vuori   +2 more
wiley   +1 more source

“One Is a Frontier”: Settler Migration as Transmogrification

open access: yesSociological Forum, Volume 41, Issue 1, Page 105-121, March 2026.
ABSTRACT This paper explores the trajectories and framing strategies of American Jewish migrants to Palestine–Israel. Drawing on original in‐depth interviews with immigrants who migrated between 1976 and 2021, alongside interviews with and observations of an “aliyah” agency, it examines meaning‐making around spatial relocation in relation to the ...
Joseph Kaplan Weinger
wiley   +1 more source

Hide and rule: Accumulation by disappearance and necro‐periurbanisation in Brazil

open access: yesTransactions of the Institute of British Geographers, Volume 51, Issue 1, March 2026.
Short Abstract This paper examines how peri‐urban spaces are governed through concealment and obfuscation. Focusing on the Baixada Fluminense near Rio de Janeiro, it connects land fraud (‘grilagem’) to the obfuscation of violence, proposing the concept of ‘accumulation by disappearance’.
Jan Simon Hutta
wiley   +1 more source

Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models. [PDF]

open access: yesSensors (Basel), 2020
Campazas-Vega A   +3 more
europepmc   +1 more source

Multitier ensemble classifiers for malicious network traffic detection

open access: yesTongxin xuebao, 2018
A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in ...
Jie WANG, Lili YANG, Min YANG
openaire   +2 more sources

Detecting AI-Generated Network Traffic Using Transformer–MLP Ensemble

open access: yesApplied Sciences
The rapid growth of generative artificial intelligence (AI) has enabled diverse applications but also introduced new attack techniques. Similar to deepfake media, generative AI can be exploited to create AI-generated traffic that evades existing ...
Byeongchan Kim   +2 more
doaj   +1 more source

Mobile malware traffic detection approach based on value-derivative GRU

open access: yesTongxin xuebao, 2020
For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve ...
Hanxun ZHOU   +5 more
doaj  

Autonomous detection of malicious traffic in vehicular networks

open access: yes, 2020
The growth of intelligent transport systems brings new highly connected vehicles on the roads of the world. These vehicles now embed new devices and services meant to increase road safety, reduce the environmental impact of the vehicles and improve the user experience. However, these new communication channels between vehicles and the rest of the world,
openaire   +1 more source

Home - About - Disclaimer - Privacy