Downloads provided by UsageCounts
In the era of digital transformation, the increasing vulnerability of infrastructure and applications is often tied to the lack of technical capability and the improved intelligence of attackers. In this paper, we discuss the complementarity between static security monitoring of rule matching and an application of self-supervised machine learning to cybersecurity. Moreover, we analyze the context and challenges of supply chain resilience and smart logistics. Furthermore, we put this interplay between the two complementary methods in the context of a self-learning and self-healing approach.
runtime, security monitoring, supply chain resilience, smart logistics, deep learning, natural language processing, anomaly detection, masked language modelling, self learning, self healing
runtime, security monitoring, supply chain resilience, smart logistics, deep learning, natural language processing, anomaly detection, masked language modelling, self learning, self healing
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 122 | |
| downloads | 94 |

Views provided by UsageCounts
Downloads provided by UsageCounts