Results 71 to 80 of about 150,359 (291)
Cyber threat intelligence includes analysis of applications and their metadata for potential threats. Static malware detection of Windows executable files can be done through the analysis of Portable Executable (PE) application file headers.
Santosh Jhansi Kattamuri +3 more
semanticscholar +1 more source
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi +3 more
wiley +1 more source
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any ...
Abel Yeboah-Ofori +6 more
doaj +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core +2 more sources
The insider on the outside: a novel system for the detection of information leakers in social networks [PDF]
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers.
Cascavilla, Giuseppe +3 more
core +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Perspectives for Cyber Strategists on Law for Cyberwar [PDF]
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source

