Results 101 to 110 of about 829,033 (289)

International Information Security: The Main Threats

open access: yesМеждународная аналитика, 2015
The article describes principles and methods of using social media as a «soft power 2.0» which is considered as an effective tool to achieve political goals of the state.
I. N. Kokhtyulina
doaj   +1 more source

Model‐based fault diagnosis and fault tolerant control in safety‐critical chemical reactors: An experimental study

open access: yesAIChE Journal, EarlyView.
Abstract This study investigates a fault‐tolerant control (FTC) approach for continuous stirred‐tank reactors (CSTR), emphasizing the importance of timely interventions to ensure operational safety under fault conditions. A systematic methodology combining residual‐based fault estimation and Dynamic Safety Margin (DSM) monitoring is developed to guide ...
Pu Du   +3 more
wiley   +1 more source

A Comprehensive Assessment of the Demographic Security of the Republic of Belarus

open access: yesСтатистика України, 2021
Security is a necessary component of the life of individuals and society as a whole. One of the most important components of the national security is demographic security, which achievement in the Republic of Belarus means the neutralization of threats ...
E. Е. Sharilova
doaj  

A comprehensive review of security threats and solutions for the online social networks industry. [PDF]

open access: yesPeerJ Comput Sci, 2023
Nawaz NA   +6 more
europepmc   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

Cyber security threats: A never-ending challenge for e-commerce. [PDF]

open access: yesFront Psychol, 2022
Liu X   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy