Results 181 to 190 of about 157,721 (269)
Sanctions, National Security, and Free Speech
ABSTRACT A fundamental, but largely overlooked, aspect of the New Washington Consensus is the use of national security arguments to restrict speech and punish disfavored speakers. Although the United States has a longer history of using sanctions to restrict speech in the terrorism context, it has recently applied sanctions to restrict political speech,
Joshua Andresen
wiley +1 more source
Sensor-Based Cyber Risk Management in Railway Infrastructure Under the NIS2 Directive. [PDF]
Wachnik R, Chruzik K, Pochopień B.
europepmc +1 more source
ABSTRACT This article examines what is known at this stage, before the envisaged publication of the legislative proposal by the European Commission in March/April 2025, about the European Union's Space Act, focusing on its potential application to non‐EU operators.
Ingo Baumann, Katharina Prall
wiley +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
Newsroom: Cybersecurity: Obama\u27s Conflicted Legacy 02-17-2017 [PDF]
Margulies, Peter
core +1 more source
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley +1 more source
AI-Driven Cybersecurity in IoT-Based Systems. [PDF]
Zhao W, Wang P.
europepmc +1 more source

