Results 141 to 150 of about 62,210 (284)
Abstract The article contributes to the emerging scholarly literature on how European democracies respond to foreign information manipulation and interference (FIMI), whilst focusing on a single case study of France. It asks how France responded to Russian FIMI and why this response has become more forceful and comprehensive over time.
Agnieszka K. Cianciara
wiley +1 more source
Packet Analysis for Cyber Attack Detection
Real-time network data collection is crucial for identifying security risks such as outdated software and open ports. Network forensics uses packet analysis to monitor traffic, detect threats, trace intrusions, and recover digital content. This study evaluates the integrity of home networks using Wireshark, capturing traffic across devices.
Dr. Harish Joshi +5 more
openaire +2 more sources
Cyberattacks on Small Banks and the Impact on Local Banking Markets
Abstract Cyberattacks on small banks have direct and spillover effects in local markets. Following successful cyberattacks, hacked small banks experience a decline in deposit growth rates. This effect of cyberattacks is not observed in hacked large banks.
FABIAN GOGOLIN +2 more
wiley +1 more source
Do robots boost productivity? A quantitative meta‐study
ABSTRACT This meta‐study analyzes the productivity effects of industrial robots. More than 1800 estimates from 85 primary studies are collected. The meta‐analytic evidence suggests that robotization has so far provided, at best, a small boost to productivity. There is strong evidence of publication bias in the positive direction.
Florian Schneider
wiley +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Building centaur responders: is emergency management ready for artificial intelligence? [PDF]
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Whyte C, Haupt B'.
europepmc +2 more sources
Markov Determinantal Point Process for Dynamic Random Sets
ABSTRACT The Law of Determinantal Point Process (LDPP) is a flexible parametric family of distributions over random sets defined on a finite state space, or equivalently over multivariate binary variables. The aim of this paper is to introduce Markov processes of random sets within the LDPP framework. We show that, when the pairwise distribution of two
Christian Gouriéroux, Yang Lu
wiley +1 more source
Conformable Fractional Deep Neural Networks (CFDNN) for high-speed cyber-attack detection. [PDF]
Ajarmah B, Iwidat H.
europepmc +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source

