A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security. [PDF]
Prasad KS +6 more
europepmc +1 more source
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley +1 more source
Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. [PDF]
Liu Z.
europepmc +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm. [PDF]
Li G +5 more
europepmc +1 more source
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network Security Enhancement
PDGKI, IJCNP
openalex +1 more source
This study introduces a novel chloro boron subphthalocyanine/polymer blend OFET sensor achieving 0.005 ppb limit of detection for ammonia at room temperature and high selectivity against similar amines. An original theoretical framework is proposed to describe the sensing mechanism, relating analyte molecular volume and Lewis basicity to sensor ...
Kavinraaj Ella Elangovan +6 more
wiley +1 more source
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis. [PDF]
Delwar TS +7 more
europepmc +1 more source
Security of V2X communications in 3GPP - 5G cellular networks
Hadi Yakan
openalex +1 more source

