Results 61 to 70 of about 79,970 (188)
Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core
Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core +1 more source
Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of humans in an increasing number of complicated tasks. Highly effective non-linear AI models are generally employed in a black-box form nested in their complex ...
Mohammed Tanvir Masud +4 more
doaj +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan +2 more
doaj
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak +2 more
doaj +1 more source
Cyber Watch an Comprensive Security Tool [PDF]
The "Cyber Watch" initiative addresses the escalating need for comprehensive online security in our interconnected society. This paper is dedicated to safeguarding digital assets and ensuring a secure digital environment for users of all technical ...
Tripathi Surendra +6 more
doaj +1 more source
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. [PDF]
Ghaleb FA +4 more
europepmc +1 more source
General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core +1 more source
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Cyber Threat Intelligence (CTI) is an important asset for organisations to facilitate the safeguarding of their systems against new and emerging cyber threats.
Arnolnt Spyros +8 more
doaj +1 more source

