Results 311 to 320 of about 196,474 (374)

Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems

open access: yesRisk Analysis, EarlyView.
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley   +1 more source

Risks of ignoring uncertainty propagation in AI‐augmented security pipelines

open access: yesRisk Analysis, EarlyView.
Abstract The use of AI technologies is being integrated into the secure development of software‐based systems, with an increasing trend of composing AI‐based subsystems (with uncertain levels of performance) into automated pipelines. This presents a fundamental research challenge and seriously threatens safety‐critical domains.
Emanuele Mezzi   +3 more
wiley   +1 more source

“Semper supra”? Trump administration policy narratives and the creation of the space force

open access: yesReview of Policy Research, EarlyView.
Abstract In 2019, the Donald Trump administration rejected the draft Treaty on the Prevention of Placement of Weapons in Space (PPWT) in the UN Conference on Disarmament and instead created the Space Force, the first new US military service branch established in decades.
Jeffrey S. Lantis
wiley   +1 more source

Generative AI cybersecurity and resilience. [PDF]

open access: yesFront Artif Intell
Radanliev P, Santos O, Ani UD.
europepmc   +1 more source

Big Brothers United: The Influence of China and Russia in Strengthening Digital Authoritarianism in Tajikistan

open access: yesSwiss Political Science Review, EarlyView.
Abstract While, in recent years China, and to a lesser degree Russia, have been mooted as “models” of authoritarian internet governance that other autocratic states can emulate, at present relatively little has been written on the transfer of internet technologies and policies within the framework of global authoritarianism.
Edward Lemon, Oleg Antonov
wiley   +1 more source

Home - About - Disclaimer - Privacy