Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
HCAP: Hybrid cyber attack prediction model for securing healthcare applications. [PDF]
Ali MF +6 more
europepmc +1 more source
The Impact of TikTok on Elections: (Mis)information and Regulatory Challenges
ABSTRACT TikTok's algorithm‐driven feed is reshaping electoral communication, yet a clear understanding of its effects is lacking. This study synthesizes and appraises evidence on how the platform's design and governance shape political (dis)information and may affect electoral dynamics.
Michele Giuseppe Giuranno +1 more
wiley +1 more source
An efficient cyber-attack detection and classification in IoT networks with high-dimensional feature set using Levenberg-Marquardt optimized feedforward neural network. [PDF]
Kuang Q, Kuang X.
europepmc +1 more source
Iran's Forward Defense in Sub‐Saharan Africa
Abstract This article examines Iran's security and defense initiatives in sub‐Saharan Africa between 1990 and 2024 and how they reflect the extraterritorial application of the regime's forward defense doctrine. In response to the long‐term erosion of its homeland defense capabilities since the Iran‐Iraq War of the 1980s—driven by infrastructure ...
Ariel Limanya Limbu, Ronen A. Cohen
wiley +1 more source
Hybrid quantum enhanced federated learning for cyber attack detection. [PDF]
Subramanian G, Chinnadurai M.
europepmc +1 more source
Signals, Red Lines, and Collision: The Israel‐Iran Spiral and US Intervention
Abstract The Iran War erupted in February 2026 without UN authorization, and Washington's rationales—Iranian nuclear ambitions, missile capacity, and proxy threats—map more closely onto Israeli than US security interests. Why have we seen two major conflicts between these belligerents in less than one year?
Buğra Sari
wiley +1 more source
An intelligent hybrid approach combining fuzzy C-means and the sperm whale algorithm for cyber attack detection in IoT networks. [PDF]
Elsedimy EI, AboHashish SMM.
europepmc +1 more source
Who Are The Greatest Cyber Attack Threats To The United States?: UNH Unveils Cyber Threat Calculator At National Defense Department Conference [PDF]
Wright, Lori
core +1 more source
From Palestine Ally to Zionist Partner: India‐Israel Relations, 2014–2025
Abstract India's pro‐Palestinian diplomatic posture, which held for nearly 70 years, has been transformed within a single decade of rule by the Hindu nationalist Bharatiya Janata Party (BJP), turning New Delhi into one of Israel's most consequential Asian partners. This shift has narrowed the coalition supporting the Palestinian cause.
Yücel Bulut
wiley +1 more source

