Showing 101 - 120 results of 229 for search 'complex optimization vulnerabilities', query time: 0.11s Refine Results
  1. 101

    Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks by Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, Uduak Onofiok Luke, Victor Anaga

    Published 2025-02-01
    “…Protecting IoT devices from these emerging vulnerabilities has become a critical priority. This study addresses the limitations of existing IoT threat detection methods, which often struggle with the dynamic nature of IoT environments and the growing complexity of cyberattacks. …”
    Get full text
    Article
  2. 102

    "Energetics of the outer retina II: Calculation of a spatio-temporal energy budget in retinal pigment epithelium and photoreceptor cells based on quantification of cellular process... by Christina Kiel, Stella Prins, Alexander J E Foss, Philip J Luthert

    Published 2025-01-01
    “…Our data provide insights into vulnerabilities in the aging OR and suggest that diurnal constraints may be important when considering therapeutic interventions to optimize metabolism.…”
    Get full text
    Article
  3. 103

    Influencing factors of self-reported near-miss in clinical nursing information system tasks among nurses: a multicenter cross-sectional study by Xingyao Du, Haoning Shi, Ying Peng, Siqi Jiang, Jingyan Song, Chunni Wang, Lin Li, Mingzhao Xiao, Qinghua Zhao, Huanhuan Huang

    Published 2025-07-01
    “…Abstract Background Clinical nursing information systems have certain safety vulnerabilities in the complex interactions of the healthcare environment. …”
    Get full text
    Article
  4. 104

    Malignant catatonia in an adolescent with pogo transposable element derived with zinc finger domain (POGZ) gene mutation: case report by Liron Leibovitch, Alon Gorenshtein, Erez Bibi, Ayala Uri

    Published 2025-09-01
    “…The findings emphasise how comprehensive, multidisciplinary approaches remain essential for optimal patient care. Moreover, this case highlights the selective utility of genetic investigation in elucidating potential underpinnings of complex, treatment-resistant malignant catatonia, whilst demonstrating that genetic variants may confer vulnerability rather than direct causation. …”
    Get full text
    Article
  5. 105

    Robust design of bicycle infrastructure networks by Christoph Steinacker, Mads Paulsen, Malte Schröder, Jeppe Rich

    Published 2025-05-01
    “…Interestingly, while the more complex optimization models yield better overall welfare results, the improvements over simpler methods are small. …”
    Get full text
    Article
  6. 106

    A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks by Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, Muhammad Arshad, Muhammad Owais, Dina S. M. Hassan, Reem Alkanhel, Mohammed Saleh Ali Muthanna

    Published 2025-04-01
    “…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
    Get full text
    Article
  7. 107

    SECURE VERTEX-EDGE DOMINATION IN HYPERCUBE AND GRID GRAPHS: APPLICATIONS OF CYBERSECURITY IN BANKING FOR SECURE TRANSACTIONS by C. Ruby Sharmila, S. Meenakshi

    Published 2025-06-01
    “…This algorithm efficiently computes the minimum number of security agents required to monitor transaction flows, thus reducing vulnerabilities. This research not only fills a critical gap in existing network security methodologies but also proposes a novel framework for protecting complex networks from evolving cyber threats, thereby advancing the frontier of cybersecurity and mathematical graph theory.…”
    Get full text
    Article
  8. 108
  9. 109

    Proof of Inherent Intelligence Consensus Mechanism Empowering Blockchain-Enabled Transactive Energy by Imran Hussain, Hafiz Ashiq Hussain, Nasim Ullah, Stanislav Misak

    Published 2025-01-01
    “…However, complex optimization problems associated with the decentralized power grid are poorly integrated into the existing blockchain applications. …”
    Get full text
    Article
  10. 110

    A Data-Driven Analysis of Engineering Contract Risk Characterization Based on Judicial Cases of Disputes by Yongcheng Zhang, Ziyi Wu, Chaohua Xiong, Jianwei Wang, Maxwell Fordjour Antwi-Afari

    Published 2025-06-01
    “…The study proposes stratified risk mitigation strategies, including governmental regulatory improvements and enterprise-level management optimizations. These findings offer valuable insights into advancing risk governance in construction contract administration, particularly through an enhanced understanding of dispute complexity and systemic vulnerabilities.…”
    Get full text
    Article
  11. 111

    An overview on extenders used in ram sperm cryopreservation by Francisco Sevilla, Gerald Muça, Luigj Turmalaj, Miguel A. Silvestre, Ignacio Araya, Anthony Valverde

    Published 2024-11-01
    “…To achieve the best results, this complex process requires the meticulous balance of numerous variables. …”
    Get full text
    Article
  12. 112

    RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency by Bello Musa Yakubu, Abdullah Abdulrahman Alabdulatif, Pattarasinee Bhattarakosol

    Published 2025-06-01
    “…The rice supply chain is a complex system that demands effective management to ensure reliability and efficiency, given the involvement of multiple stakeholders. …”
    Get full text
    Article
  13. 113

    Household systematic network analysis for achieving the food-energy-water nexus in South Africa: exploring the relationship between FEW nexus synergies and trade-offs by Thulani Ningi, Amon Taruvinga, Leocadia Zhou, Saul Ngarava

    Published 2025-12-01
    “…Network analysis, similar to the food-energy-water (FEW) nexus, facilitates the understanding of complex interdependencies and supports more effective decision-making. …”
    Get full text
    Article
  14. 114

    Collaborative vehicle routing for equitable and effective food allocation in nonprofit settings by Rabiatu Bonku, Faisal Alkaabneh, Lauren Berrings Davis

    Published 2025-04-01
    “…Design/methodology/approach – This study introduces a multiobjective Mixed Integer Programming (MIP) model aimed at addressing the complex challenge of effectively distributing food, particularly for food banks serving vulnerable populations in low-income urban and rural areas. …”
    Get full text
    Article
  15. 115

    A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P by Hyunjoo Yang, Sejin Park

    Published 2025-01-01
    “…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
    Get full text
    Article
  16. 116

    Towards a Universal Security Framework for Darknet Suppression: Conceptual Foundations and Future Prospects by Cheng HUANG, Jianwei DING, Jiapeng ZHAO, Zhouguo CHEN, Jinqiao SHI

    Published 2025-01-01
    “…In addition, these methods for predicting multi-network connections and optimizing trap node deployment improve tracking capabilities in complex environments. …”
    Get full text
    Article
  17. 117

    CRISIS, HAZARD, AND DISASTER MANAGEMENT: A STUDY OF REGULATORY FORMULATION AND INSTITUTIONAL COORDINATION by Dwi Tjahja K. Wardhono, Retno Muhardini, Nadhia Shalehanti, Dian Puji Nugraha Simatupang

    Published 2023-09-01
    “…However, in countries where unstructured regulation is unstructured, there are complexities and multiple interpretations of regulations and there are intersections of institutional authority, which creates vulnerabilities in dealing with risk. …”
    Get full text
    Article
  18. 118

    Intelligent penetration testing method for power internet of things systems combining ontology knowledge and reinforcement learning. by Shoudao Sun, Yi Lu, Di Wu, Guangyan Zhang

    Published 2025-01-01
    “…Penetration testing, as an essential means of information security protection, is critical for identifying and fixing security vulnerabilities. Given the complexity of power IoT systems and the limitations of traditional manual testing methods, this paper proposes an automated penetration testing method that combines prior knowledge with deep reinforcement learning. …”
    Get full text
    Article
  19. 119

    Preferential Cyber Defense for Power Grids by Mohammadamin Moradi, Yang Weng, John Dirkman, Ying-Cheng Lai

    Published 2023-10-01
    “…The resources that can be deployed to protect a power grid are limited, rendering the need to impose preferences and priorities in optimal resource allocation. Due to the complexity of modern power grids, exploitation of machine learning is desired for developing optimal preferential cybersecurity defense strategies, where choosing a suitable mathematical framework to describe preference satisfaction and articulating a specific machine-learning method are key. …”
    Get full text
    Article
  20. 120

    Renewable Energy Sources and the New Paradigm in Energy Engineering by Eden Mamut

    Published 2019-12-01
    “…As a consequence, in the new paradigm, the optimization solutions are shifting from compliance with simple objective functions (as minimal cost or minimal impact) towards compliance with complex, dynamic, data driven solutions.…”
    Get full text
    Article