ABSTRACT The cultures and governance of security markets in the United Kingdom are often characterised through a paradoxical narrative of simultaneous state retreat and progressive advance. In the face of repeated recent high‐profile security failures, and global changes in material political economy, we argue that UK security governance is adapting to
Ben Collier, Jamie Buchan
wiley +1 more source
A dataset for cyber threat intelligence modeling of connected autonomous vehicles. [PDF]
Wang Y +5 more
europepmc +1 more source
ABSTRACT Aim To identify the proportion of Advanced Practice Nurses' workload that takes place virtually in the delivery of direct patient care. Design An observational study was conducted for this research. Methods An overt non‐participatory time and motion study was undertaken using a predefined data collection tool to identify the activities of the ...
A. Fitzgerald, A. Flynn, M. Ryder
wiley +1 more source
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments. [PDF]
Nalinipriya G +6 more
europepmc +1 more source
Geopolitics on a Shoestring? Unpacking the EU'S Geopolitical External Assistance to Central Asia
ABSTRACT The paper examines how the European Union's (EU) increasingly emphasised geopolitical ambitions are reflected in the practice of its external assistance policy. An analysis of EU documents around various policy initiatives and funding instruments reveals that in the Commission's understanding, geopolitical external assistance increases EU ...
Balázs Szent‐Iványi, Dóra Piroska
wiley +1 more source
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture. [PDF]
Thilakarathne NN +3 more
europepmc +1 more source
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley +1 more source
Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining. [PDF]
Liu G, Lu K, Pi S.
europepmc +1 more source
Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley +1 more source
Hybrid evolutionary machine learning model for advanced intrusion detection architecture for cyber threat identification. [PDF]
Sharma A, Rani S, Driss M.
europepmc +1 more source

