A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. [PDF]
Basak M, Shin GY.
europepmc +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Hyperparameter optimization of XGBoost and hybrid CnnSVM for cyber threat detection using modified Harris hawks algorithm. [PDF]
Elwahsh H +7 more
europepmc +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Joint Extraction of Cyber Threat Intelligence Entity Relationships Based on a Parallel Ensemble Prediction Model. [PDF]
Wang H, Zhang S, Wang Z, Sun J, Liu Q.
europepmc +1 more source
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things. [PDF]
Alohali MA +7 more
europepmc +1 more source
Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. [PDF]
Weems CF +4 more
europepmc +1 more source
Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende
JCMS: Journal of Common Market Studies, EarlyView.
Benjamin Daßler, Moritz Weiss
wiley +1 more source

