Countering FIMI by Digital Authoritarianisms: Audience Architecture and Reverse Language Engineering
ABSTRACT Foreign information manipulation and interference (FIMI) campaigns on social media are currently both more accessible and more impactful than the North Atlantic Treaty Organization's (NATO) or European Union's (EU), offering their opponents superiority and efficiency on those platforms.
Michelangelo Conoscenti
wiley +1 more source
Guarding against malicious biased threats (GAMBiT) datasets: Revealing cognitive bias in human-subjects red-team cyber range operations. [PDF]
Beltz B +11 more
europepmc +1 more source
ABSTRACT This paper draws on the social control and sensemaking literatures to study how a Big 4 audit firm in the Netherlands sought to contest the national oversight body's inspection findings on one of its audit engagements. Our case study leads us to develop the concept of professional ambiguity to capture the multiple, coexisting meanings and ...
Wendy Groot, Dominic Detzen, Anna Gold
wiley +1 more source
Understanding phishing discussions on stack overflow and information security stack exchange. [PDF]
Althobaiti K, Tahaei M.
europepmc +1 more source
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection. [PDF]
Kim J, Park J.
europepmc +1 more source
ABSTRACT Between 2018 and 2021, the Identification and Documentation of Immovable Heritage Assets (IDIHA) Project recorded over 19,000 rock art panels in the AlUla (al‐‘Ulā) region of north‐western Saudi Arabia. This study presents a chronological assessment of the corpus, drawing on superimpositions, datable motifs, inscriptions, and varnish formation,
Maria Guagnin +3 more
wiley +1 more source
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source
Abstract Background and aims Cannabis is the most widely used illicit drug worldwide and is often co‐used with tobacco, the leading cause of preventable death. Although cannabis and tobacco have distinct neurobiological actions, their associations with brain volumes are unclear.
Katherine Sawyer +16 more
wiley +1 more source
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction. [PDF]
Hussain S +6 more
europepmc +1 more source
Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications. [PDF]
Chowdhary A, Jha K, Zhao M.
europepmc +1 more source

