Results 101 to 110 of about 150,359 (291)

Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement

open access: yesIEEE Access
Advanced Persistent Threat (APT) groups pose significant cybersecurity threats due to their sophisticated and persistent nature. This study introduces a novel methodology to understand their collaborative patterns and shared objectives, which is crucial ...
Zheng-Shao Chen   +9 more
semanticscholar   +1 more source

Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]

open access: yes
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core  

BVTED: A Specialized Bilingual (Chinese–English) Dataset for Vulnerability Triple Extraction Tasks

open access: yesApplied Sciences
Extracting knowledge from cyber threat intelligence is essential for understanding cyber threats and implementing proactive defense measures. However, there is a lack of open datasets in the Chinese cybersecurity field that support both entity and ...
Kai Liu   +4 more
doaj   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things

open access: yesIEEE Open Journal of the Communications Society
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of humans in an increasing number of complicated tasks. Highly effective non-linear AI models are generally employed in a black-box form nested in their complex ...
Mohammed Tanvir Masud   +4 more
doaj   +1 more source

Cyber Watch an Comprensive Security Tool [PDF]

open access: yesMATEC Web of Conferences
The "Cyber Watch" initiative addresses the escalating need for comprehensive online security in our interconnected society. This paper is dedicated to safeguarding digital assets and ensuring a secure digital environment for users of all technical ...
Tripathi Surendra   +6 more
doaj   +1 more source

General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]

open access: yes, 2017
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core   +1 more source

Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence

open access: yesIEEE transactions on engineering management
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but it remains an area showing silos and reserved for large organizations. For an area whose strength is in open and responsive sharing, we see that the generation
Vitor Jesus, Balraj Bains, Victor Chang
semanticscholar   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Home - About - Disclaimer - Privacy