Results 81 to 90 of about 27,602 (172)

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences

open access: yes, 2014
In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide
Cova, Marco   +2 more
core  

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Bootstrap Forest based method for Encrypted Network Traffic Analysis

open access: yesJournal of Information and Organizational Sciences
Encrypting communications and data over the Internet becomes essential in ensuring the privacy of communications and protecting the data from increasing threats. Hence, majority of Internet traffic and networked communications are encrypted now. However,
Shobana Durairaju   +1 more
doaj   +1 more source

The Plural Lives of E‐Waste: Valuation and Contestation in Accra's Recycling Network(s)

open access: yesThe Geographical Journal, EarlyView.
Short Abstract Electronic waste (e‐waste) in Accra is shown to be plural and ontologically multiple, enacted as livelihood, commodity, hazard, governance object and political actor across dispersed recycling networks. Using a multi‐sited, follow‐the‐thing approach and 60 interviews, I specify four socio‐material mechanisms (i.e., copper's market tempo,
Ebenezer Gyampoh Amoah
wiley   +1 more source

A Perspective From the British Society of Dental Hygiene and Therapy Members Regarding the Need for Clinical Support by a Dental Nurse

open access: yesInternational Journal of Dental Hygiene, EarlyView.
ABSTRACT Objectives In the United Kingdom (UK), Dental Hygienists (DHs) and Dental Therapists (DTs) are required by the UK's regulatory body, the General Dental Council, to “… be appropriately supported when treating patients”. However, what is deemed ‘appropriate support’, and the need for that support, has been ‘open to interpretation’, and ...
Debbie Reed   +4 more
wiley   +1 more source

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

Inflammatory and Immunological Basis of Periodontal Diseases

open access: yesJournal of Periodontal Research, EarlyView.
The periodontal lesion emerges as an evolving immunological battlefield, where host–microbiome interactions, dysregulated immune responses, fragile resolution mechanisms, and inflammophilic dysbiosis converge to shift the balance from homeostasis to unrestrained tissue destruction.
Giacomo Baima   +3 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

The application and research of machine learning in malicious encrypted traffic detection

open access: yesDianzi Jishu Yingyong
With the widespread use of encrypted communication, malicious attackers increasingly exploit encrypted traffic to conceal their activities, posing challenges to traditional signature-based and rule-based detection methods.
Tian Rui   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy