Results 91 to 100 of about 291,363 (254)
PhantomFS-v2: Dare You to Avoid This Trap
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques.
Jione Choi +8 more
doaj +1 more source
Autonomous weapon systems and international humanitarian law: a reply to the critics [PDF]
In November 2012, Human Rights Watch, in collaboration with the International Human Rights Clinic at Harvard Law School, released Losing Humanity: The Case against Killer Robots.[2] Human Rights Watch is among the most sophisticated of human rights ...
Schmitt, Michael
core
Geopolitical Risk and Food Inflation
ABSTRACT This study investigates the complex relationship between geopolitical risk and food inflation, a critical issue for global food security. Using panel data from 177 countries from 2019 to 2021, the research employs a random effects estimation model to analyze the dynamic.
Izaete Leite Nogueira +2 more
wiley +1 more source
Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight
The Dark Web is an internet domain that ensures user anonymity and has increasingly become a focal point for illegal activities and a repository for information on cyberattacks owing to the challenges in tracking its users.
Gun-Yoon Shin +6 more
doaj +1 more source
Endmember Learning with K-Means through SCD Model in Hyperspectral Scene Reconstructions
This paper proposes a simple yet effective method for improving the efficiency of sparse coding dictionary learning (DL) with an implication of enhancing the ultimate usefulness of compressive sensing (CS) technology for practical applications, such as ...
Ayan Chatterjee, Peter W. T. Yuen
doaj +1 more source
CYBER WARFARE AND INTERNATIONAL CYBER LAW: WHITHER?
This paper analyses historical, sociological and normative aspects of the cyber violence in international relations and international law, aiming to assess the adequacy of the extant international norms for its regulation.
Miodrag N. Simović +2 more
doaj +1 more source
Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core +1 more source
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen +4 more
wiley +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
Cyber Security’s Influence on Modern Society [PDF]
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core +1 more source

