Results 121 to 130 of about 79,967 (299)
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Digital currencies, including Bitcoins, Ethereum, and others, are an established alternative asset class opted by individual and institutional investors worldwide. However, this digital asset class carries several inherent risks.
Ishtiaq Ahmad Bajwa
doaj +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
The strategic competition between the US and China in cyberspace carries significant consequences for global security, governance and economic stability. This study utilises realist theories such as offensive realism and techno-nationalism to explore how
Nistha Kumari Singh +2 more
doaj +1 more source
ABSTRACT Trust is both a prerequisite and a product of insurance, as insurance contracts are built on and create trust relations that enable a risk‐averse perspective towards the future. At the same time, insurer‐policyholder relationships are characterised by a persistent distrust, rooted in insurance economics and industry reputation. In this article,
Maiju Tanninen, Gert Meyers
wiley +1 more source
The digital transformation of electric power systems into smart grids has significantly expanded the cybersecurity risk landscape of the energy sector.
Bo Nørregaard Jørgensen +1 more
doaj +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
The article examines the effectiveness of the Maritime Security Architecture (MSA) in the Western Indian Ocean Region (WIOR), focusing on how well it addresses traditional, non-traditional, and emerging maritime threats.
John Otieno Okul
doaj +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
INTERNATIONAL AND REGIONAL ORGANIZATIONS WITH ATTRIBUTES AND PREOCCUPATIONS IN PREVENTING AND FIGHTING AGAINST CYBERCRIME AND THEIR MAIN ACCOMPLISHMENTS [PDF]
At global level, there are various organizations which are constantly concerned with the analysis of the latest manifestations and evolution of cybercrime, setting up work groups to develop strategies for the prevention and fight of cybercrimes.
Gheorghe-Iulian Ioniţă +1 more
core

