Data-Driven Network Analysis for Anomaly Traffic Detection. [PDF]
Alam S, Alam Y, Cui S, Akujuobi C.
europepmc +1 more source
Blackout in Spain: Urgent Analysis of Impact on Emergency Medical Services. [PDF]
Castro-Delgado R +5 more
europepmc +1 more source
Towards the engagement of citizens in SOSTs decision-making: participatory models setting a common ground for border surveillance and respect of fundamental rights. Findings from ARESIBO H2020 project. [PDF]
Laterza R +5 more
europepmc +1 more source
Insurance Fraud in Korea, Its Seriousness, and Policy Implications. [PDF]
Jung J, Kim BJ.
europepmc +1 more source
Is cyberterrorism a strategic concern or a myth? Hype and the 9//11 tragedy have led the matter to be securitised to such an extent as to stir up paranoia and panic, giving rise to illusions of a Digital Pearl Harbour. Cyberterrorism’s naysayers have dismissed such discourse by suggesting cyberterrosists do not wield a weapon of mass destruction, but a
openaire +1 more source
Update on Patient Self-Testing with Portable and Wearable Devices: Advantages and Limitations. [PDF]
Lippi G, Pighi L, Mattiuzzi C.
europepmc +1 more source
Media, fear and the hyperreal: the construction of cyberterrorism as the ultimate threat to critical infrastructures [PDF]
Conway, Maura
core
Criterion-Referenced Assessment of Intelligence as Adaptation to the Environment: Is It Possible, Plausible, or Practical? [PDF]
Sternberg RJ +3 more
europepmc +1 more source
RESUMEN: El presente trabajo tiene por objeto definir el concepto de ciberterrorismo. Con dicha finalidad, la primera parte del artículo analiza la noción de terrorismo, género al que pertenece la especie «ciberterrorismo». La segunda parte del trabajo, en cambio, se dedica fundamentalmente a delimitar el término ciberterrorismo y a plantear los ...
openaire +1 more source

