A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Evolved Machines Shed Light on Robustness and Resilience
2014
Proceedings of the IEEE
If we follow this latter approach and evolve both the neural and morphological subsystems of machines, we can perform controlled experiments that provide unique insight into how bodies and brains can work ...
interactions to inform the design of evolving and adaptive robots. ...
Multiple Resilient Machines In [10] , we expanded the resilient machines approach to robot swarms. ...
doi:10.1109/jproc.2014.2312844
fatcat:63gzb5ii35fhxp4dlcx7cerccq
A Survey on the Role of Technological Innovation in Nigerian Deposit Money Bank Fraud Prevention
2024
South Asian Journal of Social Studies and Economics
The seamless integration of advanced technologies not only enhances security measures but also fosters a more robust, efficient, and resilient banking system, thereby mitigating risks and fostering sustainable ...
advanced data analytics, machine learning algorithms, real-time monitoring systems, and block chain technology. ...
In the ever-evolving landscape of cyber threats, Lee and Patel's empirical study in 2019 serves as a beacon, shedding light on the indispensable role of robust encryption and cybersecurity protocols in ...
doi:10.9734/sajsse/2024/v21i3790
fatcat:tkz4msz2mfenvng3k4hehwyiqm
Decentralized Architectures: A Paradigm for Scalable, Fault-Tolerant, and Efficient Distributed Systems
2024
Engineering and Technology Journal
systems in the face of evolving technological landscapes. ...
This robustness enhances system reliability and ensures uninterrupted operation, crucial in mission-critical applications. ...
A Comparative Analysis sheds light on the advantages of decentralized systems over traditional counterparts, emphasizing their adaptability and resilience. ...
doi:10.47191/etj/v9i02.16
fatcat:foebpfnxnrg4zickcpagltc34a
Cybersecurity in the Smart Grid: Vulnerabilities, Threats, and Countermeasures
2023
International Journal of Advanced Research in Science, Communication and Technology
distribution, safeguarding vital infrastructure, ensuring uninterrupted energy services, and enhancing societal resilience ...
This research paper comprehensively explores and investigated the Smart Grid's architectural vulnerabilities, analyzing evolving threat landscapes, and proposing strategic defense measures. ...
This background study delves into the context and significance of Cybersecurity in the Smart Grid: Vulnerabilities, Threats, and Countermeasures, shedding light on the motivations, vulnerabilities, and ...
doi:10.48175/ijarsct-12364
fatcat:p736udgrpbekdamsdbedf7ehk4
Machine Learning with TensorFlow and PyTorch: A Comparative Analysis
2024
resmilitaris
Machine learning frameworks play a pivotal position inside the development and deployment of modern fashions for a big selection of programs. ...
Special emphasis is positioned on know-how the learning curve related to each framework, exploring their high-degree APIs, and assessing their extensibility for studies and production environments. ...
that shed light on their respective abilties. ...
doi:10.48047/resmil.v10i1.21
fatcat:agpqglomqvgdbcrunt7mse55dm
A REVIEW OF ADVANCED ACCOUNTING TECHNIQUES IN US ECONOMIC RESILIENCE
2024
Finance & Accounting Research Journal
This research paper explores the transformative impact of advanced accounting techniques on US economic resilience. ...
The regulatory framework's role in shaping accounting practices and the emerging focus on Environmental, Social, and Governance (ESG) reporting are discussed. ...
Doing so will shed light on how advanced accounting practices contribute to the ability of the US economy to weather storms and recover robustly. ...
doi:10.51594/farj.v6i1.722
fatcat:dxamgozz6vbqjpfqw6aaqjciey
Innovative Approaches in Machine Design: Advancements, Challenges, and Future Prospects
2024
Zenodo
Challenges inherent in designing complex systems are addressed, with a focus on enhancing performance, efficiency, and sustainability while mitigating risks and optimizing cost-effectiveness. ...
This paper explores innovative methodologies and advancements in machine design, encompassing various fields such as robotics, automation, and mechanical engineering. ...
In this section, we review key studies and research findings that shed light on the advancements, challenges, and future prospects in machine design. ...
doi:10.5281/zenodo.10893606
fatcat:scr7mmtlenh7bmseveunzta6wm
Cybersecurity in the Financial Sector
2024
International Journal of Research Publication and Reviews
Recommendations focus on investment priorities, technology adoption, and regulatory compliance. ...
Emerging technologies like blockchain, AI, and quantum-safe cryptography offer promise but demand robust implementation. ...
By examining these challenges, the paper seeks to shed light on the evolving landscape of cyber threats in the financial sector and underscore the critical role of cybersecurity measures in safeguarding ...
doi:10.55248/gengpi.5.0324.0709
fatcat:e3syno7t7bc33pqmsflxzwmrha
A comprehensive review of machine learning's role in enhancing network security and threat detection
2024
World Journal of Advanced Research and Reviews
Strategies for addressing these challenges and improving the robustness of machine learning models are explored. ...
As network security threats continue to evolve in complexity and sophistication, there is a growing need for advanced solutions to enhance network security and threat detection capabilities. ...
Through a thorough examination of existing literature and case studies, the review seeks to shed light on the potential of machine learning in addressing the evolving landscape of network security threats ...
doi:10.30574/wjarr.2024.21.2.0501
fatcat:66qfsv5qr5atzevylisba5e3xu
A critical review of emerging cybersecurity threats in financial technologies
2024
International Journal of Science and Research Archive
By shedding light on the evolving threats and vulnerabilities, the paper contributes to the ongoing discourse on safeguarding the integrity and security of financial technologies. ...
A significant portion of the review focuses on the role of human factors in cybersecurity, emphasizing the need for robust training and awareness programs to empower financial professionals and users alike ...
Organizations must invest in advanced technologies, employee training, and collaboration to stay resilient against evolving threats. ...
doi:10.30574/ijsra.2024.11.1.0284
fatcat:s65o4luqtjcrdfjhd3yjop6gli
Securing tomorrow's urban frontiers: A holistic approach to cybersecurity in smart cities
2024
Information System and Smart City
By understanding the technological landscape, our goal is to devise adaptive and resilient cybersecurity measures that safeguard critical infrastructures while preserving the privacy and security of citizens ...
By addressing the intricate relationship between urbanization and technology, this project aspires to contribute to the creation of secure, resilient, and sustainable urban environments that harness the ...
Existing studies, such as Kaspersky Lab's [9] analysis of IoT-related cyber threats, shed light on the evolving nature of these vulnerabilities. ...
doi:10.59400/issc.v3i1.418
fatcat:4rjowxxpzradvdyr7bw2c4vvei
Social Engineering: Its Significance and Implications for Future Research
2024
International Journal of Research Publication and Reviews
evaluation of training and awareness programs. ...
This paper aims to explore the importance of social engineering, its various forms, and its implications for future research. ...
This paper seeks to shed light on the importance of social engineering in the context of cybersecurity. ...
doi:10.55248/gengpi.5.0124.0324
fatcat:p7zd4kb3ungdxpm3774ap2ltam
Real-time detection of malicious intrusions and attacks in cybersecurity infrastructures enabled by IOT
2024
MATEC Web of Conferences
On the three informational collections, NSL-KDD, KDDCup99, and UNSW-NB15, the result of notable cutting-edge DL classifiers accomplished the highest true rate (TNR) and highest detection the rate accompanying ...
assaults: Brute Force XXS, Brute Force WEB, DoS_Hulk_Attack, the preparation and testing stages, it likewise guaranteed the privacy and honesty of delicate data having a place with clients and frameworks ...
Through a comprehensive exploration of IDS mechanisms, algorithms, and advancements, this research aims to shed light on the evolving landscape of cyber threats and the corresponding need for sophisticated ...
doi:10.1051/matecconf/202439201127
fatcat:4a7juz47x5dlbmp6yp4dpqb6zi
CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY
2024
Computer Science & IT Research Journal
A comparative analysis of these approaches sheds light on their respective strengths and limitations. ...
A central theme of this review revolves around the nexus between employee engagement and cybersecurity resilience. ...
This detailed exploration aims to shed light on the intricacies of the cybersecurity threat landscape, encompassing various types of threats, emerging trends, motivations driving cyberattacks, vulnerabilities ...
doi:10.51594/csitrj.v5i1.708
fatcat:bkxt6pten5eqzahtdiw3oopl7q
A Hierarchical Deep Learning Architecture for Robust Intrusion Detection in Time-Evolving Security Landscapes
2024
International Journal for Research in Applied Science and Engineering Technology
Abstract: This paper introduces a novel architecture for Intrusion Detection Systems (IDS), designed to enhance resilience against adversarial attacks by integrating conventional machine learning (ML) ...
The proposed system, termed DLL-IDS, comprises three key components: a DL-based IDS, an adversarial example (AE) detector based on local intrinsic dimensionality (LID), and an ML-based IDS. ...
In [8] their seminal work, Szegedy et al. investigate the intriguing properties of neural networks, shedding light on the vulnerabilities and robustness of deep learning models. ...
doi:10.22214/ijraset.2024.58300
fatcat:csc3ff2mobfprhcuxilhxhnf54
« Previous
Showing results 1 — 15 out of 7,657 results