Results 161 to 170 of about 80,725 (273)
Innovation and National Security: The Loss of Economic and Military Strength through the Theft of Ideas [PDF]
Pedersen, Matthew D.
core +1 more source
The Cyber Threat Intelligence Cycle
The most effective intelligence programs have in common to the core principles of the Cyber Threat intelligence cycle.This adaptable five-step process through which raw data becomes cooked is fundamental to the success of an intelligence operation. We’ll examine the intelligence cycle through a cyber threat intelligence CTI lens and look at how CTI ...
openaire +1 more source
Knowledge Graphs and Critical Infrastructures: Friends or Foes?
Conceptual overview of Knowledge Graph integration in Critical Infrastructures, illustrating interconnected systems, data flows, and their role in enhancing resilience and operational intelligence. ABSTRACT Knowledge Graphs (KGs) are a natural evolution of data models representing and connecting data in a network of nodes and relations.
José Miguel Blanco +3 more
wiley +1 more source
Artificial intelligence driven multi agent framework for adaptive cyber attack simulation and automated incident response in cyber range environments. [PDF]
Agrawal A +3 more
europepmc +1 more source
ABSTRACT This study investigates the impact of digital transformation and emerging technologies, particularly generative artificial intelligence (GenAI), on the readiness and practices of crisis communication professionals in Hong Kong (HK). Despite growing theoretical advances, recent literature remains predominantly Western‐centric, with limited ...
Cindy Sing Bik Ngai +3 more
wiley +1 more source
BERT-spaCy hybrid NLP and blockchain-enhanced adaptive CTI for IOC extraction and threat prediction. [PDF]
Mishra S, Alfahidah RA, Alharbi F.
europepmc +1 more source
How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley +1 more source
Football cybersecurity threat severity prediction using multi-head transformer-based deep learning models. [PDF]
Hassan BM +5 more
europepmc +1 more source
AI Authoritarianism: Towards an Analytical Framework
Short Abstract This Intervention offers a call for investigating the deepening alignment of artificial intelligence and authoritarian politics. The paper highlights three key features of AI that inflect the workings and logics of authoritarianism: (selective) inhumanisation, the cult of intelligence and scaling. We argue that AI is not simply extending,
Thomas Dekeyser +2 more
wiley +1 more source

