Results 131 to 140 of about 8,269 (263)
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Expression of Concern: HCAP: Hybrid cyber attack prediction model for securing healthcare applications. [PDF]
PLOS One Editors.
europepmc +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
A self-evolution cyber attack scheme generation system for cybersecurity evaluation. [PDF]
Yang M +6 more
europepmc +1 more source
ADS-B Crowd-Sensor Network and Two-Step Kalman Filter for GNSS and ADS-B Cyber-Attack Detection. [PDF]
Leonardi M, Sirbu G.
europepmc +1 more source
Abstract This article seeks to assess the extent to which climatic considerations may be integrated into international humanitarian law (IHL). With evidence of significant greenhouse gas emissions from military actions in conflicts such as Gaza and Ukraine, the article highlights the climate impacts of armed conflict, showing how military activities ...
Mario Pasquale Amoroso
wiley +1 more source
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source
MOVES Research & Education Systems Seminar: Presentation; Session 3c: Human Systems and Training (Operational Systems); Moderator: Mike McCauley; ROGUEVIDEO: CyberAttack; speaker: Erik ...
openaire +1 more source

