Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes. [PDF]
Huang GC, Chang KC, Lai TH.
europepmc +1 more source
ABSTRACT An inherent divide features within the Lisbon Treaty between civilian and military/security competences; something previously more obvious via the ‘pillar system's’ separations. This division follows the Member States (MS) (natural) protection of their military/defence autonomy; their core sovereign powers.
Charlie J. P. Bennett
wiley +1 more source
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source
Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley +1 more source
Hierarchical malware detection, family identification, and variant attribution using CNN-based hybrid models on grayscale executable images. [PDF]
Saxena M, Das T.
europepmc +1 more source
FDI in Services: How Data Provisions Are Shaping the New Global Economy
ABSTRACT Coinciding with a process of slowbalization in goods, cross‐border flows of services have experienced a sharp increase, with FDI through commercial presence emerging as the dominant mode of international services supply. At the same time, a growing number of trade agreements have incorporated binding data‐related provisions aimed at regulating
Carmen Díaz‐Mora +2 more
wiley +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source
ABSTRACT We conduct two experiments to examine whether and how the framing (bonus vs. penalty) of a target‐based incentive contract affects knowledge sharing and knowledge seeking. In the first experiment, we predict and find that penalty‐framed contracts increase employees' stress due to the fear of potential loss, which in turn reduces their ...
Ta‐Tung (Stephanie) Cheng +3 more
wiley +1 more source
Detection of unseen malware threats using generative adversarial networks and deep learning models. [PDF]
Joshi C, Kumar J, Kumawat G.
europepmc +1 more source
ForestForTrees: An R package to infer forest structure from remote sensing data
Abstract Estimating forest size‐abundance distributions is essential for understanding demographic processes and structural dynamics. Remote sensing provides broad coverage but often misses smaller trees hidden beneath the canopy, complicating inference of the full size distribution.
Adam J. Eichenwald +4 more
wiley +1 more source

