Results 111 to 120 of about 137,873 (290)
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
THE EVOLUTION OF NATO’S CYBER SECURITY POLICY AND FUTURE PROSPECTS [PDF]
While the future landscape of cyberspace is becoming quite complicated, NATO must define the potential threats and adapt its strategy to these challenges.
Arif Hasan HASANOV +2 more
doaj
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]
Saeed S +4 more
europepmc +1 more source
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant +3 more
wiley +1 more source
Contextualized Filtering for Shared Cyber Threat Information. [PDF]
Dimitriadis A +6 more
europepmc +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. [PDF]
Ghaleb FA +4 more
europepmc +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
An Improved Load Forecasting Method Based on the Transfer Learning Structure under Cyber-Threat Condition. [PDF]
Zhao L, Zhang X, Chen Y, Peng X, Cao Y.
europepmc +1 more source

