Results 111 to 120 of about 557,385 (336)

Adaptive Control of Run‐and‐Tumble Escape in Pursuit‐Evasion Dynamics of Intelligent Active Particles

open access: yesAdvanced Intelligent Systems, EarlyView.
The pursuit‐evasion game is studied for two adversarial active agents, modeled as deterministic self‐steering pursuer and stochastic, cognitive evader. For a successful evasion strategy, the motile target has to exploit all available pursuer information, e.g., by tuning the tumbling frequency with the pursuer distance.
Segun Goh   +2 more
wiley   +1 more source

AI-Driven Fraud Detection in Digital Banking: A Hybrid Approach using Deep Learning and Anomaly Detection

open access: yesSistemasi: Jurnal Sistem Informasi
The rapid digital transformation in the banking sector has introduced new opportunities for efficiency and customer convenience but has also amplified the risks of financial fraud.
Harman Salih Mohammed   +2 more
doaj   +1 more source

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]

open access: yesSensors (Basel), 2023
Saeed S   +4 more
europepmc   +1 more source

Cyber-Risk Prioritisation Under Partial Information to Support Threat Intelligence

open access: green, 2023
Mario Angelelli   +3 more
openalex   +1 more source

KDLM: Lightweight Brain Tumor Segmentation via Knowledge Distillation

open access: yesAdvanced Intelligent Systems, EarlyView.
A lightweight student network is designed, which is based on multiscale and multilevel feature fusion and combined with the residual channel attention mechanism to achieve efficient feature extraction and fusion with very few parameters. A dual‐teacher collaborative knowledge distillation framework is proposed.
Baotian Li   +4 more
wiley   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. [PDF]

open access: yesEntropy (Basel), 2022
Ali H   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy