Roadmap for cyber security research

In their secUnity roadmap, 30 renowned European IT security experts of the BMBF-funded secUnity collaboration outlined how digital threats on the European level can be responded to more efficiently in the future. Among these ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Artificial intelligence must know when to ask for human help

Artificial intelligence systems are powerful tools for businesses and governments to process data and respond to changing situations, whether on the stock market or on a battlefield. But there are still some things AI isn't ...

Automated disease detection in maize

Maize is perhaps the single, most-important cereal crop in the world. It is consumed by millions of people and is a staple for a large proportion of the global population. It is also used for animal feed and its total production ...

Maximising influence in a network

Finding ways to maximize influence on social networks is a significant endeavour for a wide range of people including those involved in marketing, election campaigns, and outbreak detection, for instance. Technically in a ...

page 3 from 343