Results 191 to 200 of about 139,452 (290)
Who Are The Greatest Cyber Attack Threats To The United States?: UNH Unveils Cyber Threat Calculator At National Defense Department Conference [PDF]
Wright, Lori
core +1 more source
Digital arrest in the cyber age: a psychological perspective on fear, authority, and consciousness. [PDF]
Robert SJ, Singh V, Pandey RP, Bhuyan B.
europepmc +1 more source
Signals, Red Lines, and Collision: The Israel‐Iran Spiral and US Intervention
Abstract The Iran War erupted in February 2026 without UN authorization, and Washington's rationales—Iranian nuclear ambitions, missile capacity, and proxy threats—map more closely onto Israeli than US security interests. Why have we seen two major conflicts between these belligerents in less than one year?
Buğra Sari
wiley +1 more source
Adaptive Evolution-Inspired Algorithm for Intrusion Detection in Bioinformatics Systems. [PDF]
Alam M, Samal CK, Ali A, Alourani A.
europepmc +1 more source
From Palestine Ally to Zionist Partner: India‐Israel Relations, 2014–2025
Abstract India's pro‐Palestinian diplomatic posture, which held for nearly 70 years, has been transformed within a single decade of rule by the Hindu nationalist Bharatiya Janata Party (BJP), turning New Delhi into one of Israel's most consequential Asian partners. This shift has narrowed the coalition supporting the Palestinian cause.
Yücel Bulut
wiley +1 more source
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
This research paper presents the design and development of an open-source Cyber Threat Intelligence (CTI) platform aimed at improving real-time cybersecurity monitoring and threat analysis. The system addresses the growing challenges of cyberattacks such as ransomware, phishing, data breaches, and zero-day vulnerabilities by automating the collection ...
Panchole, Yogesh +2 more
openaire +1 more source
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley +1 more source
Internalized criticism and absence of care: separate pathways from childhood abuse and neglect to dual harm via self-compassion. [PDF]
Mao Y, Xie Z, Zhang L, Wang W.
europepmc +1 more source
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source

