Windows-APT 2025: A dataset for APT-inspired attack scenarios on windows systems. [PDF]
Mozaffari M +2 more
europepmc +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
BERT-spaCy hybrid NLP and blockchain-enhanced adaptive CTI for IOC extraction and threat prediction. [PDF]
Mishra S, Alfahidah RA, Alharbi F.
europepmc +1 more source
ABSTRACT Sugar crops, including but not limited to sugarcane, sugar beet, sweet sorghum and stevia, are major sources of sugar production in the world. However, conventional breeding approaches, limited by long breeding cycles, low efficiency and restricted capacity to improve complex traits in sugar crops, are increasingly insufficient to address the ...
Peilin Wang +7 more
wiley +1 more source
Artificial intelligence driven approach for securing backup data and enhancing cyber resilience in sustainable smart infrastructure. [PDF]
Kumar B +5 more
europepmc +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
Integrating CTI and threat modeling for cyber resilience: An AHP assessment. [PDF]
Podlesnik L, Bernik I, Mihelič A.
europepmc +1 more source
Sources of Threats and Threats in the Cyber Security
Jan Svoboda, Ludek Lukas
openaire +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Integrating NLP and Ensemble Learning into Next-Generation Firewalls for Robust Malware Detection in Edge Computing. [PDF]
Moila RL, Velempini M.
europepmc +1 more source

