Results 111 to 120 of about 829,033 (289)
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Liquid Jetting‐Based Miniature Robotic Navigation in Confined Fluidic Spaces
We introduce a new class of liquid‐jetting‐based miniature robots (JetBots) ranging in size from mm‐to‐cm, featuring a unified approach in design, fabrication, and actuation. They demonstrate fast locomotion (30.3 cm/s), rapid steering (648.8°/s), and diverse functions, such as puncturing soft materials and unlimited cargo sampling and delivery, paving
Debasish Roy, Tianlu Wang
wiley +1 more source
Background The advancement of digital health technologies (DHTs) in the healthcare industry has revolutionized healthcare by improving efficiency and accessibility.
Jonathan Kissi +6 more
doaj +1 more source
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. [PDF]
Kotak J +4 more
europepmc +1 more source
SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley +1 more source
Impact of Security Threats on Investment in Nigeria
A study on the relationship between security threats and investment in Nigeria is essential for providing empirically data-driven insights into how security challenges, such as insurgency, crime and instability, influence investment decisions.
Isa Jibrin OKPE +3 more
doaj +1 more source
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
The advent of Fifth-Generation (5G) networks has introduced significant security challenges due to increased complexity and diverse use cases. Conventional threat models may fall short of addressing these emerging threats effectively. This paper presents
Rafiq Ahmad Khan +4 more
doaj +1 more source
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]
Alahmadi AN +5 more
europepmc +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
CBRN Threats and the Economic Analysis of Terrorism [PDF]
The aim of this paper is to investigate the economic aspects of CBRN threats. For this purpose, the extent to which this topic is reflected in freely-accessible academic literature and the costs associated with such threats will be assessed. Furthermore,
Alexander Ramseger +2 more
core

