Results 241 to 250 of about 26,946 (315)
Multi‐Objective Reinforcement Learning for Automated Resilient Cyber Defence
Autonomous Cyber Defence agents were trained using multi‐objective reinforcement learning to defend a computer network against red‐agent attack, trading off network security and service availability. A Pareto Front was established (lower left), which shows the trade off between accessing network services (green) and defending against compromised ...
Ross O'Driscoll +3 more
wiley +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM +6 more
europepmc +1 more source
The study assesses the applicability of Industry 4.0 technologies in 112 ongoing road construction projects in Tanzania using a quantitative research design from Construction 4.0 (C4.0) perspectives. The technologies include big data analytics, artificial intelligence (AI), building information modelling (BIM), computer simulation, cloud computing, 3D ...
Erasto Petro Jakobo, Ismail W. R. Taifa
wiley +1 more source
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things. [PDF]
Guo C +5 more
europepmc +1 more source
Abstract Biological invasions are a major driver of biodiversity loss worldwide. The scale and pace of these invasions often exceed resources available for control, necessitating long‐term management strategies that balance complex sustainability goals.
Fabian C. Kyne +4 more
wiley +1 more source
Efficient IoT User Authentication Protocol with Semi-Trusted Servers. [PDF]
Hu S +5 more
europepmc +1 more source
Multiplicative Homomorphic E-Auction with Formally Provable Security
Kun Peng, Matt Henricksen
openalex +1 more source
Reimagining habituation: The case for a reciprocal and contextual understanding
Abstract As the frequency and intensity of human–wildlife interactions continue to rise, the process and outcomes of habituation are becoming more important. Commonly defined as ‘…a waning of response to a repeated, neutral stimuli’ or of similar wording, we argue that these conceptualisations of habituation are too simplistic in the context of direct ...
Ethan D. Doney +8 more
wiley +1 more source
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments. [PDF]
Wang C, Wu H, Gan Y, Zhang R, Ma M.
europepmc +1 more source

