Results 121 to 130 of about 557,385 (336)

Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence [PDF]

open access: gold, 2017
Qiang Li   +4 more
openalex   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence [PDF]

open access: diamond, 2020
Jungsoo Park   +3 more
openalex   +1 more source

RT‐DETR‐DA for Complex Scenes: Distracted Driving Detection With Feature Interaction and Dynamic Perception

open access: yesAdvanced Intelligent Systems, EarlyView.
This work proposes RT‐DETR‐DA, an enhanced real‐time detection framework for identifying distracted driving in complex, real‐world environments. The model introduces a dynamic sparse gating multiscale attention module and an attention‐guided dual‐path fusion module to strengthen multiscale perception and cross‐layer feature interaction.
Yi Liu   +4 more
wiley   +1 more source

Research on knowledge graph construction technology for cyber threat intelligence based on large language models

open access: yesTongxin xuebao
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan   +2 more
doaj  

Towards Proactive Domain Name Security: An Adaptive System for .ro domains Reputation Analysis

open access: yesFuture Internet
In a digital landscape marked by the exponential growth of cyber threats, the development of automated domain reputation systems is extremely important.
Carmen Ionela Rotună   +2 more
doaj   +1 more source

Adaptive Target Recognition: A Case Study Involving Airport Baggage Screening

open access: yes, 2018
This work addresses the question whether it is possible to design a computer-vision based automatic threat recognition (ATR) system so that it can adapt to changing specifications of a threat without having to create a new ATR each time.
Kak, Avinash C.   +2 more
core  

Liquid Jetting‐Based Miniature Robotic Navigation in Confined Fluidic Spaces

open access: yesAdvanced Intelligent Systems, EarlyView.
We introduce a new class of liquid‐jetting‐based miniature robots (JetBots) ranging in size from mm‐to‐cm, featuring a unified approach in design, fabrication, and actuation. They demonstrate fast locomotion (30.3 cm/s), rapid steering (648.8°/s), and diverse functions, such as puncturing soft materials and unlimited cargo sampling and delivery, paving
Debasish Roy, Tianlu Wang
wiley   +1 more source

Bottom‐Up Coacervate‐Based Artificial Cells: Integrating Cellular Hallmarks into Complex Life‐Like Systems

open access: yesAngewandte Chemie, EarlyView.
Current interest in artificial cell research underscores its potential to deepen our understanding of life's fundamental processes. This review highlights advances in bottom‐up coacervate‐based artificial cell engineering via combined integration of cellular hallmarks.
Arjan Hazegh Nikroo   +3 more
wiley   +2 more sources

Home - About - Disclaimer - Privacy