Results 51 to 60 of about 46,889 (202)

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Comparison of Supervised Machine Learning Algorithms for Malware Detection

open access: yesJournal of Computing Research and Innovation, 2023
Due to the prevalence of security issues and cyberattacks, cybersecurity is crucial in today's environment. Malware has also evolved significantly over the past few years.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Sustainability Challenges to the Steel Industry in a Developing Country: Sanctions and Security Issues at the Forefront

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This article contributes to sustainability research by investigating the complex, geopolitically induced challenges faced by industrial supply chains under international sanctions. Using Iran's steel industry as a case, it examines sustainability barriers through the lens of stakeholder theory. A mixed methods approach was employed.
Seyed Hamed Moosavirad   +2 more
wiley   +1 more source

Trends in Android Malware Detection

open access: yesJournal of Digital Forensics, Security and Law, 2013
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and
Kaveh Shaerpour   +2 more
openaire   +3 more sources

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Cryptomining Malware Early Detection Method Based on AECD Embedding [PDF]

open access: yesJisuanji kexue yu tansuo
Cryptomining malware can compromise system security, reduce hardware lifetime, and cause significant power consumption. Therefore, implementing cryptomining malware early detection to stop its damage in time is critical to system security.
CAO Chuanbo, GUO Chun, LI Xianchao, SHEN Guowei
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Windows Malware Detection Under the Machine Learning Models and Neutrosophic Numbers [PDF]

open access: yesNeutrosophic Sets and Systems
Significant cybersecurity risks are posed by malware assaults on Windows computers, which call for efficient detection and prevention systems.
Alber S. Aziz   +5 more
doaj   +1 more source

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware

open access: yesIEEE Access, 2021
Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques in their variety of malware with the aim of bypassing detection by antiviruses ...
Zainub Mumtaz   +4 more
doaj   +1 more source

DQN‐Guided Subset‐Induced OCSVM Kernel Approximation for Imbalanced Anomaly Detection

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
Anomaly detection under limited normal data remains a fundamental challenge due to severe class imbalance and scarcity of anomalies. We propose a novel framework that reformulates support vector selection in One‐Class SVM as a sequential decision‐making problem.
Wenqian Yu, Jiaying Wu, Jinglu Hu
wiley   +1 more source

Home - About - Disclaimer - Privacy