Results 51 to 60 of about 80,725 (273)

Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]

open access: yes, 2018
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core  

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction

open access: yesInformation, 2018
Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]
Paulo Shakarian
doaj   +1 more source

Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie   +10 more
wiley   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]

open access: yes, 2018
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core   +2 more sources

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

SmartSentry: Cyber Threat Intelligence in Industrial IoT

open access: yesIEEE Access
While the Internet of Things (IoT) paradigm has transformed connectivity, it has also brought with it previously unheard-of security risks. The categorization of IoT attacks using several machine learning techniques and a deep learning method is the main
Sapna Sadhwani   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy