Results 101 to 110 of about 114,652 (137)
Some of the next articles are maybe not open access.
A Distributed Parameter Saturated Capacitor Model for Hysteresis in Piezoelectric Actuators
Cybersecurity and Cyberforensics Conference, 2018Hysteresis is a very important nonlinearity in piezoelectric actuators (PEA). This paper proposes a distributed parameter saturated capacitor (DPSC) approach to model and compensate for hysteresis. The DPSC model is extended from saturated capacitor (SC)
Yanfang Liu, Desong Du, Jun Zhao, M. Huo
semanticscholar +1 more source
Lightweight Quantum Signatures for Smart City Data Integrity and Accuracy
2025 3rd International Conference on Business Analytics for Technology and Security (ICBATS)In increasingly urbanizing surroundings, smart cities (SCs) are essential for improving urban living, addressing resource constraints, optimizing infrastructure, and utilizing technology for efficiency, sustainability, and a higher standard of living ...
Tuqa Ghani Tregi, Mishall Al-Zubaidie
semanticscholar +1 more source
Journal of cybersecurity and information management
Leukemia, a cancer that attacks human white blood cells, is one of the deadliest illnesses. Detecting affected cells in microscopic images becomes tedious because feature variants are not predicted correctly by a hematologist.
B. B, A. Mohanarathinam
semanticscholar +1 more source
Leukemia, a cancer that attacks human white blood cells, is one of the deadliest illnesses. Detecting affected cells in microscopic images becomes tedious because feature variants are not predicted correctly by a hematologist.
B. B, A. Mohanarathinam
semanticscholar +1 more source
Journal of Cybersecurity and Privacy
Implementing machine learning is imperative for enhancing advanced cybersecurity practices globally. The current cybersecurity landscape needs further investigation into the potential impasse.
Kamran Razzaq, M. Shah
semanticscholar +1 more source
Implementing machine learning is imperative for enhancing advanced cybersecurity practices globally. The current cybersecurity landscape needs further investigation into the potential impasse.
Kamran Razzaq, M. Shah
semanticscholar +1 more source
Mesopotamian Journal of CyberSecurity
In today's digital era, cybersecurity has become a principal concern because of the increasing frequency and advancement of cyber threats. This study explores machine learning models for detecting and predicting anomalies in cybersecurity datasets.
Adil M. Salman +4 more
semanticscholar +1 more source
In today's digital era, cybersecurity has become a principal concern because of the increasing frequency and advancement of cyber threats. This study explores machine learning models for detecting and predicting anomalies in cybersecurity datasets.
Adil M. Salman +4 more
semanticscholar +1 more source
Journal of Cybersecurity and Privacy
Small and medium-sized enterprises (SMEs) continue to face significant cybersecurity challenges due to limited financial resources, technical capacity, and awareness.
Nisha Rawindaran +2 more
semanticscholar +1 more source
Small and medium-sized enterprises (SMEs) continue to face significant cybersecurity challenges due to limited financial resources, technical capacity, and awareness.
Nisha Rawindaran +2 more
semanticscholar +1 more source
Journal of Cybersecurity
The space industry has grown significantly in recent years and has become essential to our daily lives. Space applications are now critical for powering necessary infrastructure, such as energy grids and financial networks.
Francesco Casaril, Letterio Galletta
semanticscholar +1 more source
The space industry has grown significantly in recent years and has become essential to our daily lives. Space applications are now critical for powering necessary infrastructure, such as energy grids and financial networks.
Francesco Casaril, Letterio Galletta
semanticscholar +1 more source
AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation
Journal of Cybersecurity and PrivacyThis paper proposes and evaluates a novel real-time cybersecurity framework integrating artificial intelligence (AI) and blockchain technology to enhance the detection and auditability of cyber threats.
Sam Goundar, Iqbal Gondal
semanticscholar +1 more source
Silicon Valley Cybersecurity Conference
Large Language Models (LLMs) and generative AI (GenAI) systems, such as ChatGPT, Claude, Gemini, LLaMA, Copilot, Stable Diffusion by OpenAI, Anthropic, Google, Meta, Microsoft, Stability AI, respectively, are revolutionizing cybersecurity, enabling both ...
Kiarash Ahi, Saeed Valizadeh
semanticscholar +1 more source
Large Language Models (LLMs) and generative AI (GenAI) systems, such as ChatGPT, Claude, Gemini, LLaMA, Copilot, Stable Diffusion by OpenAI, Anthropic, Google, Meta, Microsoft, Stability AI, respectively, are revolutionizing cybersecurity, enabling both ...
Kiarash Ahi, Saeed Valizadeh
semanticscholar +1 more source
AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning
Journal of Cybersecurity and PrivacyPhishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQN ...
Haidar Jabbar, Samir Al-Janabi
semanticscholar +1 more source

