Nation-States and Their Operations in Planting of Malware in Other Countries: Is It Legal Under International Law [PDF]
Chung, John J.
core +1 more source
Integrating NLP and Ensemble Learning into Next-Generation Firewalls for Robust Malware Detection in Edge Computing. [PDF]
Moila RL, Velempini M.
europepmc +1 more source
Media, fear and the hyperreal: the construction of cyberterrorism as the ultimate threat to critical infrastructures [PDF]
Conway, Maura
core
Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment. [PDF]
van Gerwen S +3 more
europepmc +1 more source
Cyber-threat intelligence sharing
The report will describe the architecture of the cyber-threat information sharing tool,including the design of the enriched VDB.
openaire +1 more source
Sparse-selective quantization for real-time cyber threat detection in large-scale networks. [PDF]
Xie Y, Wang R, Dong L.
europepmc +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source
Digital arrest in the cyber age: a psychological perspective on fear, authority, and consciousness. [PDF]
Robert SJ, Singh V, Pandey RP, Bhuyan B.
europepmc +1 more source
A generative AI-driven cybersecurity framework for small and medium enterprises software development: an ANN-ISM approach. [PDF]
Awan M +5 more
europepmc +1 more source

