[HTML][HTML] A typology of cybersecurity behavior among knowledge workers

D Baltuttis, T Teubner, MTP Adam - Computers & Security, 2024 - Elsevier
While the cybersecurity literature on behavioral factors has expanded, current
countermeasures often overlook employee-specific behavioral differences, leading to …

Comprehensive review of AI and ML tools for earthquake damage assessment and retrofitting strategies

PKS Bhadauria - Earth Science Informatics, 2024 - Springer
This comprehensive review paper examines the integration of Artificial Intelligence (AI) and
Machine Learning (ML) tools in earthquake engineering, specifically focusing on damage …

[HTML][HTML] Future of process safety: Insights, approaches, and potential developments

H Abedsoltan, A Abedsoltan - Process Safety and Environmental Protection, 2024 - Elsevier
This review explores the evolving landscape of process safety, emphasizing the integration
of digitalization and advanced technologies. It assesses the role of the industrInternetrnet of …

[HTML][HTML] Pore size classification and prediction based on distribution of reservoir fluid volumes utilizing well logs and deep learning algorithm in a complex lithology

H Bagheri, R Mohebian, A Moradzadeh… - Artificial Intelligence in …, 2024 - Elsevier
Pore size analysis plays a pivotal role in unraveling reservoir behavior and its intricate
relationship with confined fluids. Traditional methods for predicting pore size distribution …

[HTML][HTML] The dynamics of frequency connectedness between technology ETFs and uncertainty indices under extreme market conditions

O Ozcelebi, R McIver, SH Kang - Financial Innovation, 2025 - jfin-swufe.springeropen.com
We examine technology ETF and uncertainty index (VIX, GVZ, and OVZ) spillover dynamics
and quantile frequency interconnectedness across market states. This study is the first to use …

Application of various machine learning algorithms in view of predicting the CO2 emissions in the transportation sector

G Çınarer, MK Yeşilyurt, Ü Ağbulut… - … and Technology for …, 2024 - stet-review.org
This study applies three different artificial intelligence algorithms (Multi-layer Perceptron
(MLP), Extreme Gradient Boosting (XGBoost), and Support Vector Machine (SVM)) to …

Tuning Natural Language Processing by Altered Metaheuristics Algorithm for Phishing Email Identification

L Jovanovic, N Bacanin, R Ravikumar… - … on Computing and …, 2024 - Springer
The high-speed development and integration of the Internet have led to the emergence of
numerous technologies. Email has become an essential part of everyday life for most …

A Comprehensive Review on Transforming Security and Privacy with NLP

R Garg, A Gupta, A Srivastava - … on Cryptology & Network Security with …, 2023 - Springer
The revolutionary field of natural language processing has broad implications for privacy
and safety. This article reviews the wide range of natural language processing uses for …

A Comprehensive Review on Transforming Security and Privacy with NLP

RGA Gupta, A Srivastava - … and Network Security with Machine Learning - books.google.com
The revolutionary field of natural language processing has broad implications for privacy
and safety. This article reviews the wide range of natural language processing uses for …

[PDF][PDF] Artificial Intelligence in Geosciences

Pore size analysis plays a pivotal role in unraveling reservoir behavior and its intricate
relationship with confined fluids. Traditional methods for predicting pore size distribution …