Results 91 to 100 of about 291,363 (254)

PhantomFS-v2: Dare You to Avoid This Trap

open access: yesIEEE Access, 2020
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques.
Jione Choi   +8 more
doaj   +1 more source

Autonomous weapon systems and international humanitarian law: a reply to the critics [PDF]

open access: yes, 2013
In November 2012, Human Rights Watch, in collaboration with the International Human Rights Clinic at Harvard Law School, released Losing Humanity: The Case against Killer Robots.[2] Human Rights Watch is among the most sophisticated of human rights ...
Schmitt, Michael
core  

Geopolitical Risk and Food Inflation

open access: yesThunderbird International Business Review, Volume 68, Issue 2, Page 165-176, March/April 2026.
ABSTRACT This study investigates the complex relationship between geopolitical risk and food inflation, a critical issue for global food security. Using panel data from 177 countries from 2019 to 2021, the research employs a random effects estimation model to analyze the dynamic.
Izaete Leite Nogueira   +2 more
wiley   +1 more source

Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight

open access: yesIEEE Access
The Dark Web is an internet domain that ensures user anonymity and has increasingly become a focal point for illegal activities and a repository for information on cyberattacks owing to the challenges in tracking its users.
Gun-Yoon Shin   +6 more
doaj   +1 more source

Endmember Learning with K-Means through SCD Model in Hyperspectral Scene Reconstructions

open access: yesJournal of Imaging, 2019
This paper proposes a simple yet effective method for improving the efficiency of sparse coding dictionary learning (DL) with an implication of enhancing the ultimate usefulness of compressive sensing (CS) technology for practical applications, such as ...
Ayan Chatterjee, Peter W. T. Yuen
doaj   +1 more source

CYBER WARFARE AND INTERNATIONAL CYBER LAW: WHITHER?

open access: yesRevija za kriminologiju i krivično pravo, 2020
This paper analyses historical, sociological and normative aspects of the cyber violence in international relations and international law, aiming to assess the adequacy of the extant international norms for its regulation.
Miodrag N. Simović   +2 more
doaj   +1 more source

Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]

open access: yes, 2017
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core   +1 more source

The Role of Creativity and Innovation Management Research in Times of Changing Security and Defence Realities

open access: yesCreativity and Innovation Management, Volume 35, Issue 1, Page 84-90, March 2026.
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen   +4 more
wiley   +1 more source

A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]

open access: yes, 2011
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray   +2 more
core   +2 more sources

Cyber Security’s Influence on Modern Society [PDF]

open access: yes, 2020
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core   +1 more source

Home - About - Disclaimer - Privacy