Results 71 to 80 of about 80,725 (273)
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee +2 more
doaj +1 more source
Improving Forensic Triage Efficiency through Cyber Threat Intelligence
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information ...
Nikolaos Serketzis +4 more
doaj +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha +5 more
wiley +1 more source
Enhanced threat intelligence framework for advanced cybersecurity resilience
The increasing severity of cyber-attacks against organizations emphasizes the necessity for efficient threat intelligence. This article presents a novel multi-layered architecture for threat intelligence that integrates diverse data streams, including ...
Moutaz Alazab +5 more
doaj +1 more source
Data Schema Evolution for the Self‐Adaptive Software Domain: A Systematic Mapping Study
ABSTRACT Context Self‐adaptive Software (SaS) is a special category of software systems that enables adaptation at runtime to address new user requirements or changes in its execution environment. This article focuses on a specific category of SaS named SaS2DB, which encompasses systems that require the storage of data in a database. In short, a SaS2DB
Gabriel Nagassaki Campos +4 more
wiley +1 more source
General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core +1 more source
Systems‐Based Organisational Resilience Framework: A Delphi Study‐Based Validation and Verification
ABSTRACT The increasing systemic complexity of the Fourth Industrial Revolution has heightened the need for robust approaches to organisational resilience. Despite its growing prominence, resilience research remains fragmented, with limited consensus on core dimensions, causal interdependencies and mechanisms suitable for dynamic assessment. This study
Dumisani Manzini +3 more
wiley +1 more source
The Military and Security Aspects of Obama’s Pivot to Asia [PDF]
Rozdział z: The Quandaries and Foreign Development, ed. D.
Furgacz, Przemysław
core

