Results 131 to 140 of about 557,385 (336)
MICRA: A Modular Intelligent Cybersecurity Response Architecture with Machine Learning Integration
The growing sophistication of cyber threats has posed significant challenges for organizations in terms of accurately detecting and responding to incidents in a coordinated manner.
Alessandro Carvalho Coutinho +1 more
doaj +1 more source
A threat intelligence framework for protecting smart satellite-based healthcare networks. [PDF]
Al-Hawawreh M, Moustafa N, Slay J.
europepmc +1 more source
The Australian methylamphetamine market: the national picture [PDF]
The Australian Methylamphetamine Market provide a concise understanding of the nature of organised criminal involvement in the Australian methylamphetamine market.
Australian Crime Commission
core
Overview of the proposed Gate‐Align‐SED, including two stages of training: (1) Mean‐Teacher SSL Training; and (2) Enhancer Model Training. In complex real‐world environments such as disaster monitoring, effective sound event detection (SED) is often hindered by the presence of noise and limited labeled data.
Jieli Chen +4 more
wiley +1 more source
Distributed Trust in the Age of Malware Blockchain Applications
Blockchain technology is redefining the foundations of cybersecurity by introducing decentralized, tamper-resistant mechanisms for data integrity, trust management, and malware intelligence sharing.
Paul A. Gagniuc +2 more
doaj +1 more source
SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley +1 more source
Threat Intelligence Platforms (TIPs) enable organizations to share indicators of compromise (IoCs), yet the operational CTI lifecycle exposes multiple, largely independent privacy surfaces: query content and access-pattern leakage during IoC lookup ...
Emre Camalan, Baris Celiktas
doaj +1 more source
Analysing Technique Classification Performance of Cyber Threat Intelligence Extractors
H. N. Nguyen
openalex +1 more source
Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues [PDF]
Doowon Jeong
openalex +1 more source

