Results 111 to 120 of about 150,359 (291)

Research on knowledge graph construction technology for cyber threat intelligence based on large language models

open access: yesTongxin xuebao
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan   +2 more
doaj  

Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review

open access: yesApplied Sciences
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak   +2 more
doaj   +1 more source

The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]

open access: yes, 2012
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core   +1 more source

Percolation Model of Insider Threats to Assess the Optimum Number of Rules

open access: yes, 2014
Rules, regulations, and policies are the basis of civilized society and are used to coordinate the activities of individuals who have a variety of goals and purposes.
Gadepally, Vijay   +2 more
core   +1 more source

Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making.
Charalambos Bratsas   +5 more
semanticscholar   +1 more source

Technology for Whom and for What? A Global South View of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley   +1 more source

Cyber security: State of the art, challenges and future directions

open access: yesCyber Security and Applications
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass   +2 more
doaj   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Home - About - Disclaimer - Privacy