A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. [PDF]
Basak M, Shin GY.
europepmc +1 more source
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source
Hyperparameter optimization of XGBoost and hybrid CnnSVM for cyber threat detection using modified Harris hawks algorithm. [PDF]
Elwahsh H +7 more
europepmc +1 more source
Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley +1 more source
Joint Extraction of Cyber Threat Intelligence Entity Relationships Based on a Parallel Ensemble Prediction Model. [PDF]
Wang H, Zhang S, Wang Z, Sun J, Liu Q.
europepmc +1 more source
Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. [PDF]
Weems CF +4 more
europepmc +1 more source
From products to smart solutions: A value‐creation approach
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich +4 more
wiley +1 more source
A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats. [PDF]
Santos P +4 more
europepmc +1 more source
ABSTRACT This study examines how artificial intelligence (AI) reshapes gender dynamics in workplace negotiations. Adopting a technofeminist lens, we conceptualize gender–technology relations as mutually shaping and fluid. Using a convergent mixed‐methods design, participants negotiated job offers with an AI chatbot recruiter.
Sue H. Moon, Jing Betty Feng
wiley +1 more source
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things. [PDF]
Alohali MA +7 more
europepmc +1 more source

