Results 61 to 70 of about 79,970 (188)

Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]

open access: yes
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core  

Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]

open access: yes, 2002
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core   +1 more source

Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things

open access: yesIEEE Open Journal of the Communications Society
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of humans in an increasing number of complicated tasks. Highly effective non-linear AI models are generally employed in a black-box form nested in their complex ...
Mohammed Tanvir Masud   +4 more
doaj   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Research on knowledge graph construction technology for cyber threat intelligence based on large language models

open access: yesTongxin xuebao
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan   +2 more
doaj  

Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review

open access: yesApplied Sciences
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak   +2 more
doaj   +1 more source

Cyber Watch an Comprensive Security Tool [PDF]

open access: yesMATEC Web of Conferences
The "Cyber Watch" initiative addresses the escalating need for comprehensive online security in our interconnected society. This paper is dedicated to safeguarding digital assets and ensuring a secure digital environment for users of all technical ...
Tripathi Surendra   +6 more
doaj   +1 more source

General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]

open access: yes, 2017
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core   +1 more source

AI-Based Holistic Framework for Cyber Threat Intelligence Management

open access: yesIEEE Access
Cyber Threat Intelligence (CTI) is an important asset for organisations to facilitate the safeguarding of their systems against new and emerging cyber threats.
Arnolnt Spyros   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy