Results 101 to 110 of about 114,652 (137)
Some of the next articles are maybe not open access.

A Distributed Parameter Saturated Capacitor Model for Hysteresis in Piezoelectric Actuators

Cybersecurity and Cyberforensics Conference, 2018
Hysteresis is a very important nonlinearity in piezoelectric actuators (PEA). This paper proposes a distributed parameter saturated capacitor (DPSC) approach to model and compensate for hysteresis. The DPSC model is extended from saturated capacitor (SC)
Yanfang Liu, Desong Du, Jun Zhao, M. Huo
semanticscholar   +1 more source

Lightweight Quantum Signatures for Smart City Data Integrity and Accuracy

2025 3rd International Conference on Business Analytics for Technology and Security (ICBATS)
In increasingly urbanizing surroundings, smart cities (SCs) are essential for improving urban living, addressing resource constraints, optimizing infrastructure, and utilizing technology for efficiency, sustainability, and a higher standard of living ...
Tuqa Ghani Tregi, Mishall Al-Zubaidie
semanticscholar   +1 more source

Deep Spectral Convolution Neural Network Based Leukemia Cancer Detection Using Invariant Entity Scalar Feature Selection

Journal of cybersecurity and information management
Leukemia, a cancer that attacks human white blood cells, is one of the deadliest illnesses. Detecting affected cells in microscopic images becomes tedious because feature variants are not predicted correctly by a hematologist.
B. B, A. Mohanarathinam
semanticscholar   +1 more source

Advancing Cybersecurity Through Machine Learning: A Scientometric Analysis of Global Research Trends and Influential Contributions

Journal of Cybersecurity and Privacy
Implementing machine learning is imperative for enhancing advanced cybersecurity practices globally. The current cybersecurity landscape needs further investigation into the potential impasse.
Kamran Razzaq, M. Shah
semanticscholar   +1 more source

Enhancing Cybersecurity with Machine Learning: A Hybrid Approach for Anomaly Detection and Threat Prediction

Mesopotamian Journal of CyberSecurity
In today's digital era, cybersecurity has become a principal concern because of the increasing frequency and advancement of cyber threats. This study explores machine learning models for detecting and predicting anomalies in cybersecurity datasets.
Adil M. Salman   +4 more
semanticscholar   +1 more source

Cybersecurity Framework: Addressing Resiliency in Welsh SMEs for Digital Transformation and Industry 5.0

Journal of Cybersecurity and Privacy
Small and medium-sized enterprises (SMEs) continue to face significant cybersecurity challenges due to limited financial resources, technical capacity, and awareness.
Nisha Rawindaran   +2 more
semanticscholar   +1 more source

Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation

Journal of Cybersecurity
The space industry has grown significantly in recent years and has become essential to our daily lives. Space applications are now critical for powering necessary infrastructure, such as energy grids and financial networks.
Francesco Casaril, Letterio Galletta
semanticscholar   +1 more source

AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation

Journal of Cybersecurity and Privacy
This paper proposes and evaluates a novel real-time cybersecurity framework integrating artificial intelligence (AI) and blockchain technology to enhance the detection and auditability of cyber threats.
Sam Goundar, Iqbal Gondal
semanticscholar   +1 more source

Large Language Models (LLMs) and Generative AI in Cybersecurity and Privacy: A Survey of Dual-Use Risks, AI-Generated Malware, Explainability, and Defensive Strategies

Silicon Valley Cybersecurity Conference
Large Language Models (LLMs) and generative AI (GenAI) systems, such as ChatGPT, Claude, Gemini, LLaMA, Copilot, Stable Diffusion by OpenAI, Anthropic, Google, Meta, Microsoft, Stability AI, respectively, are revolutionizing cybersecurity, enabling both ...
Kiarash Ahi, Saeed Valizadeh
semanticscholar   +1 more source

AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning

Journal of Cybersecurity and Privacy
Phishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQN ...
Haidar Jabbar, Samir Al-Janabi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy