Results 101 to 110 of about 829,033 (289)
International Information Security: The Main Threats
The article describes principles and methods of using social media as a «soft power 2.0» which is considered as an effective tool to achieve political goals of the state.
I. N. Kokhtyulina
doaj +1 more source
Abstract This study investigates a fault‐tolerant control (FTC) approach for continuous stirred‐tank reactors (CSTR), emphasizing the importance of timely interventions to ensure operational safety under fault conditions. A systematic methodology combining residual‐based fault estimation and Dynamic Safety Margin (DSM) monitoring is developed to guide ...
Pu Du +3 more
wiley +1 more source
A Comprehensive Assessment of the Demographic Security of the Republic of Belarus
Security is a necessary component of the life of individuals and society as a whole. One of the most important components of the national security is demographic security, which achievement in the Republic of Belarus means the neutralization of threats ...
E. Е. Sharilova
doaj
A comprehensive review of security threats and solutions for the online social networks industry. [PDF]
Nawaz NA +6 more
europepmc +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
An Efficient Identification of Security Threats in Requirement Engineering Methodology. [PDF]
Subha R, Haldorai A.
europepmc +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges. [PDF]
Taylor SJ +3 more
europepmc +1 more source
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella +5 more
wiley +1 more source
Cyber security threats: A never-ending challenge for e-commerce. [PDF]
Liu X +6 more
europepmc +1 more source

