A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. [PDF]
Basak M, Shin GY.
europepmc +1 more source
Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende
JCMS: Journal of Common Market Studies, Volume 64, Issue 3, Page 1272-1284, May 2026.
Benjamin Daßler, Moritz Weiss
wiley +1 more source
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
ACO-tuned randomized decision tree for detecting cyber threats in mobile web applications. [PDF]
Aljohani A.
europepmc +1 more source
Swarm-based intelligent models for developing cybersecurity frameworks with IDS. [PDF]
Kumar NS +5 more
europepmc +1 more source
A Review of Agentic AI in Cybersecurity: Cognitive Autonomy, Ethical Governance, and Quantum-Resilient Defense. [PDF]
Adabara I +4 more
europepmc +1 more source
Cyber-threat intelligence sharing
The report will describe the architecture of the cyber-threat information sharing tool,including the design of the enriched VDB.
openaire +1 more source
Prediction-based attack detection and mitigation mechanism in power system. [PDF]
Zhai P, Zhang M, Wang X.
europepmc +1 more source
Overview of Cyber Threat Intelligence
openaire +1 more source
Orchestrating machine learning models in a swarm architecture for IoT inline malware detection. [PDF]
Hanif M +5 more
europepmc +1 more source

