Results 91 to 100 of about 82,924 (315)
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation
Deep neural networks are vulnerable to adversarial attacks. The literature is rich with algorithms that can easily craft successful adversarial examples. In contrast, the performance of defense techniques still lags behind.
Katabi, Dina +3 more
core
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster +5 more
wiley +1 more source
Multi‐Agent Reinforcement Learning for Joint Police Patrol and Dispatch
ABSTRACT Police patrol units need to split their time between performing preventive patrol and being dispatched to serve emergency incidents. In the existing literature, patrol and dispatch decisions are often studied separately. We consider joint optimization of these two decisions to improve police operations efficiency and reduce response time to ...
Matthew Repasky, He Wang, Yao Xie
wiley +1 more source
A Partial Break of the Honeypots Defense to Catch Adversarial Attacks [PDF]
Nicholas Carlini
openalex +1 more source
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien +2 more
wiley +1 more source
Comparison and Evaluation of the attacks and defenses against Adversarial attacks
Aleksandar Janković
openalex +1 more source
Moving target defense for adaptive adversaries
Machine learning (ML) plays a central role in the solution of many security problems, for example enabling malicious and innocent activities to be rapidly and accurately distinguished and appropriate actions to be taken. Unfortunately, a standard assumption in ML - that the training and test data are identically distributed - is typically violated in ...
Richard Colbaugh, Kristin Glass
openaire +2 more sources
Abstract Managing wildfire risk requires consideration of complex and uncertain scientific evidence as well as trade‐offs between different values and goals. Conflicting perspectives on what values and goals are most important, what ought to be done and what trade‐offs are acceptable complicate those decisions.
Pele J. Cannon, Sarah Clement
wiley +1 more source
Stop Using Limiting Stimuli as a Measure of Sensitivities of Energetic Materials
ABSTRACT Accurately estimating the sensitivity of explosive materials is a potentially life‐saving task that requires standardised protocols across nations. One of the most widely applied procedures worldwide is the so‐called ‘1‐In‐6’ test from the United Nations (UN) Manual of Tests in Criteria, which estimates a ‘limiting stimulus’ for a material. In
Dennis Christensen, Geir Petter Novik
wiley +1 more source

