Results 151 to 160 of about 142,803 (291)
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source
ACO-tuned randomized decision tree for detecting cyber threats in mobile web applications. [PDF]
Aljohani A.
europepmc +1 more source
Cyber Threats to Hospitals and Critical Infrastructure in Times of COVID-19 Pandemic
Tokat Y.
europepmc +1 more source
Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley +1 more source
An efficient federated learning based defense mechanism for software defined network cyber threats through machine learning models. [PDF]
Amin R +5 more
europepmc +1 more source
From products to smart solutions: A value‐creation approach
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich +4 more
wiley +1 more source
ABSTRACT This study examines how artificial intelligence (AI) reshapes gender dynamics in workplace negotiations. Adopting a technofeminist lens, we conceptualize gender–technology relations as mutually shaping and fluid. Using a convergent mixed‐methods design, participants negotiated job offers with an AI chatbot recruiter.
Sue H. Moon, Jing Betty Feng
wiley +1 more source
AI-Driven intrusion detection and prevention systems to safeguard 6G networks from cyber threats. [PDF]
Chinnasamy P +7 more
europepmc +1 more source
ABSTRACT Aim To identify the proportion of Advanced Practice Nurses' workload that takes place virtually in the delivery of direct patient care. Design An observational study was conducted for this research. Methods An overt non‐participatory time and motion study was undertaken using a predefined data collection tool to identify the activities of the ...
A. Fitzgerald, A. Flynn, M. Ryder
wiley +1 more source
Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review. [PDF]
Zakhmi K +5 more
europepmc +1 more source

