Results 131 to 140 of about 2,596,832 (272)

Evaluating Reinforcement Learning Agents for Autonomous Cyber Defence

open access: yesApplied AI Letters, Volume 6, Issue 3, October 2025.
ABSTRACT Artificial Intelligence (AI) is set to become an essential tool for defending against machine‐speed attacks on increasingly connected cyber networks and systems. It will allow self‐defending and self‐recovering cyber‐defence agents to be developed, which can respond to attacks in a timely manner.
Abby Morris   +2 more
wiley   +1 more source

Consequences of nonclassical measurement for the algorithmic description of continuous dynamical systems [PDF]

open access: yes
Continuous dynamical systems intuitively seem capable of more complex behavior than discrete systems. If analyzed in the framework of the traditional theory of computation, a continuous dynamical system with countably many quasistable states has at least
Fields, Chris
core   +1 more source

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

The Generic Circular Triangle‐Free Graph

open access: yesJournal of Graph Theory, Volume 109, Issue 4, Page 426-445, August 2025.
ABSTRACT In this article, we introduce the generic circular triangle‐free graph C 3 and propose a finite axiomatization of its first‐order theory. In particular, our main results show that a countable graph G embeds into C 3 if and only if it is a { K 3 , K 1 + 2 K 2 , K 1 + C 5 , C 6 }‐free graph.
Manuel Bodirsky, Santiago Guzmán‐Pro
wiley   +1 more source

The Banalisation of ‘Suspicion’: Politics of Prevention, Digitisation of Prediction, Fate of Travellers

open access: yesInternational Migration, Volume 63, Issue 4, August 2025.
ABSTRACT This article argues that there is no single form of security that reduces insecurity but rather forms of (in)security that are contradictory and mutually destructive. This is the case between traditional liberal security, based on evidence, the individual and the penal order, and contemporary predictive preventive security, based on ...
Didier Bigo
wiley   +1 more source

A New Method for Slope Risk Stability Assessment: Combined Weighting and Improved Cloud Matter‐Element Model

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
In this paper, firstly, based on the principles of scientificity, rationality, representativeness, feasibility, and coefficient of variation, the evaluation index system of slope stability is constructed. Then, the subjective and objective weights of the evaluation indexes are determined by the improved analytic hierarchy process (IAHP) and anti ...
Wan‐Rui Hu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy