Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley +1 more source
A dataset for cyber threat intelligence modeling of connected autonomous vehicles. [PDF]
Wang Y+5 more
europepmc +1 more source
Risks of ignoring uncertainty propagation in AI‐augmented security pipelines
Abstract The use of AI technologies is being integrated into the secure development of software‐based systems, with an increasing trend of composing AI‐based subsystems (with uncertain levels of performance) into automated pipelines. This presents a fundamental research challenge and seriously threatens safety‐critical domains.
Emanuele Mezzi+3 more
wiley +1 more source
Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review. [PDF]
Zakhmi K+5 more
europepmc +1 more source
“Semper supra”? Trump administration policy narratives and the creation of the space force
Abstract In 2019, the Donald Trump administration rejected the draft Treaty on the Prevention of Placement of Weapons in Space (PPWT) in the UN Conference on Disarmament and instead created the Space Force, the first new US military service branch established in decades.
Jeffrey S. Lantis
wiley +1 more source
Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM. [PDF]
Nazim S+5 more
europepmc +1 more source
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
Scott Farrow, Jules Szanton
openalex +2 more sources
Generative AI cybersecurity and resilience. [PDF]
Radanliev P, Santos O, Ani UD.
europepmc +1 more source
Abstract While, in recent years China, and to a lesser degree Russia, have been mooted as “models” of authoritarian internet governance that other autocratic states can emulate, at present relatively little has been written on the transfer of internet technologies and policies within the framework of global authoritarianism.
Edward Lemon, Oleg Antonov
wiley +1 more source
A simulation-driven computational framework for adaptive energy-efficient optimization in machine learning-based intrusion detection systems. [PDF]
Ranpara R+3 more
europepmc +1 more source