Search
Search Results
-
Fuzzy Machine Learning for Smart Grid Instability Detection
The smart grid is an advanced power system concept that integrates electricity and communication within system networks. Its primary goal is to... -
Designing and Implementing an Interactive Cloud Platform for Teaching Machine Learning with Medical Data
Machine learning (ML), especially deep learning (DL), is a field of research that has recently attracted enormous attention and is currently evolving... -
Who Guards the Guardians? On Robustness of Deep Neural Networks
In this chapter, we describe available vectors of attacks against discriminative Deep Neural Networks. We consider a wide range of attacks that aim... -
Safeguarding the Future of Artificial Intelligence: An AI Blueprint
Current developments in artificial intelligence, such as ChatGPT, Stable Diffusion or Deep Fakes, pose new challenges to our society. It is becoming... -
Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid Model
Intrusion detection in Internet of Things (IoT) networks is a critical challenge due to the dynamic and evolving nature of cyber threats. To address... -
Cybersecurity and the AI Silver Bullet
The implementation of artificial intelligence (AI) is rapidly growing in many fields. AI tools now aid decision-makers by providing insights through... -
To Know What You Do Not Know: Challenges for Explainable AI for Security and Threat Intelligence
Human analysts working for threat intelligence leverage tools powered by artificial intelligence to routinely assemble actionable intelligence. Yet,... -
On Protection of the Next-Generation Mobile Networks Against Adversarial Examples
As artificial intelligence (AI) has become an integral part of modern mobile networks, there is an increasing concern about vulnerabilities of... -
PLC Availability Scheme
Ensuring availability in Power Line Communication (PLC) networks is paramount to maintaining uninterrupted communication, especially given their... -
An Overview of Power Line Communication Networks
This chapter provides a comprehensive survey of Power Line Communication (PLC) networks, reviewing the different technologies that shape this field.... -
PLC Network Integrity Solution
Assuring that the power line has not been altered or tampered with in an unauthorized manner is key for maintaining the integrity of Power Line... -
Telling Data Stories, the Way Averroes Wrote His Commentaries – A Three-Level Approach to Facilitate Data-Driven Decision Making
Data stories are a narrative format that presents information and data in a way that is easy to understand and engage with. They contain various... -
Data Literacy in Public Libraries in Croatia: An Empirical Study
The importance of data literacy in a data-driven world is ever-increasing. There are many definitions for the term data literacy, suggesting... -
Maturity Model as the Tool for Information/Data Literacy Assessment
The aim of this article is to present the similarities between two assessment tools: data literacy (DL) rubrics and research data management services... -
Improving STEM Competences by Using Artificial Intelligence to Generate Video Games Based on Student Written Stories
In this paper the results of conducted research as a prerequisite for a model developed in order to foster STEM competences of non-STEM students are... -
Blockchain-Based Access Control for Electronic Health Records
Blockchain-based access control mechanisms have the potential to significantly enhance the security and privacy of electronic health record systems.... -
Threat Modeling Towards Resilience in Smart ICUs
Healthcare digitization has significantly enhanced patient care and alleviated the workload of hospital staff. This trend towards automation has also... -
Methodology for Automating Attacking Agents in Cyber Range Training Platforms
The world faces cyberattacks daily and the targets of these attacks are often critical infrastructure, including the healthcare sector. In addition,... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...