Results 111 to 120 of about 829,033 (289)

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Liquid Jetting‐Based Miniature Robotic Navigation in Confined Fluidic Spaces

open access: yesAdvanced Intelligent Systems, EarlyView.
We introduce a new class of liquid‐jetting‐based miniature robots (JetBots) ranging in size from mm‐to‐cm, featuring a unified approach in design, fabrication, and actuation. They demonstrate fast locomotion (30.3 cm/s), rapid steering (648.8°/s), and diverse functions, such as puncturing soft materials and unlimited cargo sampling and delivery, paving
Debasish Roy, Tianlu Wang
wiley   +1 more source

Healthcare professionals’ perception on emergence of security threat using digital health technologies in healthcare delivery

open access: yesDigital Health
Background The advancement of digital health technologies (DHTs) in the healthcare industry has revolutionized healthcare by improving efficiency and accessibility.
Jonathan Kissi   +6 more
doaj   +1 more source

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Impact of Security Threats on Investment in Nigeria

open access: yesCECCAR Business Review
A study on the relationship between security threats and investment in Nigeria is essential for providing empirically data-driven insights into how security challenges, such as insurgency, crime and instability, influence investment decisions.
Isa Jibrin OKPE   +3 more
doaj   +1 more source

5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach

open access: yesIEEE Open Journal of the Communications Society
The advent of Fifth-Generation (5G) networks has introduced significant security challenges due to increased complexity and diverse use cases. Conventional threat models may fall short of addressing these emerging threats effectively. This paper presents
Rafiq Ahmad Khan   +4 more
doaj   +1 more source

Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]

open access: yesSensors (Basel), 2022
Alahmadi AN   +5 more
europepmc   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

CBRN Threats and the Economic Analysis of Terrorism [PDF]

open access: yes
The aim of this paper is to investigate the economic aspects of CBRN threats. For this purpose, the extent to which this topic is reflected in freely-accessible academic literature and the costs associated with such threats will be assessed. Furthermore,
Alexander Ramseger   +2 more
core  

Home - About - Disclaimer - Privacy