Results 161 to 170 of about 557,385 (336)
Machine Learning–Enhanced Threat Intelligence for Understanding the Underground Cybercrime Market
Naga Charan Nandigama
openalex +2 more sources
Adverse Childhood Experiences in Autistic and Neurotypical Girls
ABSTRACT Adverse childhood experiences (ACEs) are potentially traumatic, life‐altering events that occur in childhood with long‐term negative physical and/or mental health outcomes. Previous research, while limited and largely focused on males, suggests children with autism spectrum disorder (ASD) are at higher risk of experiencing ACEs than typically ...
Jon Ebert +4 more
wiley +1 more source
ABSTRACT Social anxiety (SA) is highly prevalent among autistic adults, yet little is known about how autistic people respond to common therapeutic strategies, such as exposure tasks. This study examined responses to a structured speech exposure task embedded within an 8‐week modified cognitive–behavioral therapy (M‐CBT) program.
Bruna B. Roisenberg +4 more
wiley +1 more source
Knowledge graph based ubiquitous power IoT security visualization technology
With the construction of the ubiquitous power IoT,the power network transform to interconnection,the data become more interactive and shared,and the business transform to lateral link-up,which pose new challenges to the original network security ...
Yang YU, Shaomin ZHU, Chaoyi BIAN
doaj
‘Let's talk about the weather’: The activist curriculum and global climate change education
Abstract Activist movements have garnered significant global attention on a range of sustainability issues, often involving collectives of citizens coming together. Invoked is the idea of citizens informed to act, emerging not from a common‐sense understanding of everyday life, but rather from a deep political understanding of the world—one that is ...
Richard Pountney
wiley +1 more source
CVEjoin: A Security Dataset of Vulnerability and Threat Intelligence Information
Rodrigo Parente +2 more
openalex +1 more source
‘Where are the adults?’: Troubling child‐activism and children's political participation
Abstract Children's political participation is a well‐established theme in childhood studies. In this article we offer an original account of child activism that takes into account the entangled and emergent aspect of children as activists. We begin with a historical and a conceptual review, noting the importance of mid‐20th century developments such ...
Sharon Hunter, Claire Cassidy
wiley +1 more source
BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture. [PDF]
Tolah A.
europepmc +1 more source
Abstract This study explores the multifaceted dynamics of student sentiment towards artificial intelligence (AI)‐based education by integrating sentiment analysis techniques with statistical methods, including Monte Carlo simulations and decision tree modelling, alongside qualitative grounded theory analysis.
Volkan Duran +2 more
wiley +1 more source
Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment. [PDF]
van Gerwen S +3 more
europepmc +1 more source

