Results 141 to 150 of about 80,725 (273)
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Iran's Forward Defense in Sub‐Saharan Africa
Abstract This article examines Iran's security and defense initiatives in sub‐Saharan Africa between 1990 and 2024 and how they reflect the extraterritorial application of the regime's forward defense doctrine. In response to the long‐term erosion of its homeland defense capabilities since the Iran‐Iraq War of the 1980s—driven by infrastructure ...
Ariel Limanya Limbu, Ronen A. Cohen
wiley +1 more source
Signals, Red Lines, and Collision: The Israel‐Iran Spiral and US Intervention
Abstract The Iran War erupted in February 2026 without UN authorization, and Washington's rationales—Iranian nuclear ambitions, missile capacity, and proxy threats—map more closely onto Israeli than US security interests. Why have we seen two major conflicts between these belligerents in less than one year?
Buğra Sari
wiley +1 more source
From Palestine Ally to Zionist Partner: India‐Israel Relations, 2014–2025
Abstract India's pro‐Palestinian diplomatic posture, which held for nearly 70 years, has been transformed within a single decade of rule by the Hindu nationalist Bharatiya Janata Party (BJP), turning New Delhi into one of Israel's most consequential Asian partners. This shift has narrowed the coalition supporting the Palestinian cause.
Yücel Bulut
wiley +1 more source
EDAER: Entropy-Driven Approach for Entity and Relation Extraction in Chinese Cyber Threat Intelligence. [PDF]
Li Y +6 more
europepmc +1 more source
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley +1 more source
Joint Extraction of Cyber Threat Intelligence Entity Relationships Based on a Parallel Ensemble Prediction Model. [PDF]
Wang H, Zhang S, Wang Z, Sun J, Liu Q.
europepmc +1 more source
ABSTRACT Sugar crops, including but not limited to sugarcane, sugar beet, sweet sorghum and stevia, are major sources of sugar production in the world. However, conventional breeding approaches, limited by long breeding cycles, low efficiency and restricted capacity to improve complex traits in sugar crops, are increasingly insufficient to address the ...
Peilin Wang +7 more
wiley +1 more source
Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley +1 more source
A dataset for cyber threat intelligence modeling of connected autonomous vehicles. [PDF]
Wang Y +5 more
europepmc +1 more source

