We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 1,866 results
  1. Fuzzy Machine Learning for Smart Grid Instability Detection

    The smart grid is an advanced power system concept that integrates electricity and communication within system networks. Its primary goal is to...
    Fabio Martinelli, Francesco Mercaldo, Antonella Santone in Artificial Intelligence for Security
    Chapter 2024
  2. Designing and Implementing an Interactive Cloud Platform for Teaching Machine Learning with Medical Data

    Machine learning (ML), especially deep learning (DL), is a field of research that has recently attracted enormous attention and is currently evolving...
    Frederic Jonske, Kevin Osthues, ... Johannes Kraus in Artificial Intelligence for Security
    Chapter 2024
  3. Who Guards the Guardians? On Robustness of Deep Neural Networks

    In this chapter, we describe available vectors of attacks against discriminative Deep Neural Networks. We consider a wide range of attacks that aim...
    Misha Glazunov, Apostolis Zarras in Artificial Intelligence for Security
    Chapter 2024
  4. Safeguarding the Future of Artificial Intelligence: An AI Blueprint

    Current developments in artificial intelligence, such as ChatGPT, Stable Diffusion or Deep Fakes, pose new challenges to our society. It is becoming...
    Alexander Adrowitzer, Marlies Temper, ... Oliver Eigner in Artificial Intelligence for Security
    Chapter 2024
  5. Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid Model

    Intrusion detection in Internet of Things (IoT) networks is a critical challenge due to the dynamic and evolving nature of cyber threats. To address...
    Mansour Alqarni, Akramul Azim in Artificial Intelligence for Security
    Chapter 2024
  6. Cybersecurity and the AI Silver Bullet

    The implementation of artificial intelligence (AI) is rapidly growing in many fields. AI tools now aid decision-makers by providing insights through...
    Anton Holmström, Daniel Innala Ahlmark, ... Åsa Ericson in Artificial Intelligence for Security
    Chapter 2024
  7. To Know What You Do Not Know: Challenges for Explainable AI for Security and Threat Intelligence

    Human analysts working for threat intelligence leverage tools powered by artificial intelligence to routinely assemble actionable intelligence. Yet,...
    Sarah van Gerwen, Jorge Constantino, ... Fabio Massacci in Artificial Intelligence for Security
    Chapter 2024
  8. On Protection of the Next-Generation Mobile Networks Against Adversarial Examples

    As artificial intelligence (AI) has become an integral part of modern mobile networks, there is an increasing concern about vulnerabilities of...
    Mikhail Zolotukhin, Di Zhang, Timo Hämäläinen in Artificial Intelligence for Security
    Chapter 2024
  9. PLC Availability Scheme

    Ensuring availability in Power Line Communication (PLC) networks is paramount to maintaining uninterrupted communication, especially given their...
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  10. An Overview of Power Line Communication Networks

    This chapter provides a comprehensive survey of Power Line Communication (PLC) networks, reviewing the different technologies that shape this field....
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  11. PLC Network Integrity Solution

    Assuring that the power line has not been altered or tampered with in an unauthorized manner is key for maintaining the integrity of Power Line...
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  12. Telling Data Stories, the Way Averroes Wrote His Commentaries – A Three-Level Approach to Facilitate Data-Driven Decision Making

    Data stories are a narrative format that presents information and data in a way that is easy to understand and engage with. They contain various...
    Vincent de Vevey, Marielle Guirlet, ... René Schneider in Information Experience and Information Literacy
    Conference paper 2024
  13. Data Literacy in Public Libraries in Croatia: An Empirical Study

    The importance of data literacy in a data-driven world is ever-increasing. There are many definitions for the term data literacy, suggesting...
    Conference paper 2024
  14. Maturity Model as the Tool for Information/Data Literacy Assessment

    The aim of this article is to present the similarities between two assessment tools: data literacy (DL) rubrics and research data management services...
    Conference paper 2024
  15. Improving STEM Competences by Using Artificial Intelligence to Generate Video Games Based on Student Written Stories

    In this paper the results of conducted research as a prerequisite for a model developed in order to foster STEM competences of non-STEM students are...
    Ivana Ogrizek Biškupić, Mario Konecki, Mladen Konecki in Information Experience and Information Literacy
    Conference paper 2024
  16. Blockchain-Based Access Control for Electronic Health Records

    Blockchain-based access control mechanisms have the potential to significantly enhance the security and privacy of electronic health record systems....
    Khandoker Tahmid Sami, Mohsen Toorani in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  17. Threat Modeling Towards Resilience in Smart ICUs

    Healthcare digitization has significantly enhanced patient care and alleviated the workload of hospital staff. This trend towards automation has also...
    Christian Baumhör, Thomas Henning, Matteo Große-Kampmann in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  18. Methodology for Automating Attacking Agents in Cyber Range Training Platforms

    The world faces cyberattacks daily and the targets of these attacks are often critical infrastructure, including the healthcare sector. In addition,...
    Pablo Martínez Sánchez, Pantaleone Nespoli, ... Félix Gómez Mármol in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  19. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  20. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
Did you find what you were looking for? Share feedback.