Results 11 to 20 of about 5,305 (181)
Artificial intelligence: An eye cast towards the mental health nursing horizon
Abstract There has been an international surge towards online, digital, and telehealth mental health services, further amplified during COVID‐19. Implementation and integration of technological innovations, including artificial intelligence (AI), have increased with the intention to improve clinical, governance, and administrative decision‐making ...
Rhonda L. Wilson +10 more
wiley +1 more source
Cybersecurity’s grammars: A more‐than‐human geopolitics of computation
Abstract On one June afternoon in 2017, during an autoethnography of a malware analysis and detection laboratory, NotPetya quickly caused destruction. This malware has since been characterised as a key geopolitical event in cybersecurity, causing billions of dollars in damage as it rendered inoperable computers across the world.
Andrew C. Dwyer
wiley +1 more source
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐from‐home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device.
Daniela Pöhn +2 more
wiley +1 more source
Nation‐state cyberattacks, and particularly Advanced Persistent Threats (APTs), have rocketed in the last years. Their use may be aligned with nation‐state geopolitical and economic (GPE) interests, which are key for the underlying international relations (IRs). However, the interdependency between APTs and GPE (and thus IRs) has not been characterized
Lorena González-Manzano +5 more
wiley +1 more source
Aiming at the face photos of film and television animation, this paper proposes a new fast three‐dimensional (3D) face modelling algorithm. First of all, based on the LBF algorithm, this paper proposes a multifeature selection idea to automatically detect multiple features of the face. Secondly, in order to solve the shortcomings of slow training speed
Limin Xu, Zhihan Lv
wiley +1 more source
MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology
Over the last few decades, the Internet has brought about a myriad of benefits to almost every aspect of our daily lives. However, malware attacks have also widely proliferated, mainly aiming at legitimate network users, resulting in millions of dollars in damages if proper protection and response measures are not settled and enforced. In this context,
Isabella Martínez Martínez +5 more
wiley +1 more source
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Currently, online organizational resources and assets are potential targets of several types of attack, the most common being flooding attacks. We consider the Distributed Denial of Service (DDoS) as the most dangerous type of flooding attack that could target those resources.
Bashar Ahmad Khalaf +9 more
wiley +1 more source
The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth [PDF]
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order.
Clark David D. +8 more
core +1 more source
Cyber conflict in the light of article 5 of the North Atlantic treaty
The rapid development of technology and hence also the cybernetic sphere, including the associat-ed difficulties in defining it, as well as the occurrences within it and the lack of upholding legal regula-tions and too little awareness in public and ...
Сильвія Лещук
doaj +1 more source
Cybersecurity Research Meets Science and Technology Studies
This article sets out to show how different understandings of technology as suggested by Science and Technology Studies (STS) help reveal different political facets of cybersecurity.
Myriam Dunn Cavelty
doaj +1 more source

