Results 71 to 80 of about 80,725 (273)

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

open access: yesIEEE Access
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee   +2 more
doaj   +1 more source

Improving Forensic Triage Efficiency through Cyber Threat Intelligence

open access: yesFuture Internet, 2019
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information ...
Nikolaos Serketzis   +4 more
doaj   +1 more source

Malware in the Future? Forecasting of Analyst Detection of Cyber Events

open access: yes, 2018
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi   +51 more
core   +1 more source

Industry 5.0 for Sustainable Healthcare Services: Analyzing the Prospects and Obstacles for the Indian Healthcare System

open access: yesSustainable Development, EarlyView.
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha   +5 more
wiley   +1 more source

Enhanced threat intelligence framework for advanced cybersecurity resilience

open access: yesEgyptian Informatics Journal
The increasing severity of cyber-attacks against organizations emphasizes the necessity for efficient threat intelligence. This article presents a novel multi-layered architecture for threat intelligence that integrates diverse data streams, including ...
Moutaz Alazab   +5 more
doaj   +1 more source

Data Schema Evolution for the Self‐Adaptive Software Domain: A Systematic Mapping Study

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Context Self‐adaptive Software (SaS) is a special category of software systems that enables adaptation at runtime to address new user requirements or changes in its execution environment. This article focuses on a specific category of SaS named SaS2DB, which encompasses systems that require the storage of data in a database. In short, a SaS2DB
Gabriel Nagassaki Campos   +4 more
wiley   +1 more source

General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]

open access: yes, 2017
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core   +1 more source

Systems‐Based Organisational Resilience Framework: A Delphi Study‐Based Validation and Verification

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT The increasing systemic complexity of the Fourth Industrial Revolution has heightened the need for robust approaches to organisational resilience. Despite its growing prominence, resilience research remains fragmented, with limited consensus on core dimensions, causal interdependencies and mechanisms suitable for dynamic assessment. This study
Dumisani Manzini   +3 more
wiley   +1 more source

The Military and Security Aspects of Obama’s Pivot to Asia [PDF]

open access: yes, 2014
Rozdział z: The Quandaries and Foreign Development, ed. D.
Furgacz, Przemysław
core  

Home - About - Disclaimer - Privacy