Nation-States and Their Operations in Planting of Malware in Other Countries: Is It Legal Under International Law [PDF]
Chung, John J.
core +1 more source
We explore a topological model that situates teachers' agency as a constituent element within the convergent and divergent dynamics at the intersection of human‐mediated and algorithmically mediated pedagogies. Ubiquitous AI in education is designed to simulate, emulate and automate human processes and behaviours through datafication.
Keith Turvey, Norbert Pachler
wiley +1 more source
Proactive identification of cybersecurity compromises via the PROID compromise assessment framework. [PDF]
Alkhalaf AA +3 more
europepmc +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
Latent topic-driven cyber intelligence model for tactics, techniques, and procedures (TTPs) detection using hybrid framework and Birch-inspired optimisation. [PDF]
Alanazi MM, Wahab AWA, Idris MYI.
europepmc +1 more source
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source
Integrating AI in security information and event management for real time cyber defense. [PDF]
Khan S +4 more
europepmc +1 more source
Who Are The Greatest Cyber Attack Threats To The United States?: UNH Unveils Cyber Threat Calculator At National Defense Department Conference [PDF]
Wright, Lori
core +1 more source
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things. [PDF]
Alohali MA +7 more
europepmc +1 more source

