Results 281 to 290 of about 557,385 (336)
Sparse-selective quantization for real-time cyber threat detection in large-scale networks. [PDF]
Xie Y, Wang R, Dong L.
europepmc +1 more source
INTERNATIONAL LAW RESPONSES TO PLANETARY THREATS: ARTIFICIAL INTELLIGENCE LAW & SUSTAINABILITY
Jon Truby
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The threat of intelligent collisions
IT Professional, 2004With the advent of intelligent transportation systems (ITS), safer and more efficient roadways are on the horizon. Future generations of in-vehicle ITS will network with nearby vehicles for greater safety and efficiency. Through wireless communication and advanced sensor technologies, intelligent vehicles will learn of nearby vehicles' intentions and ...
Jeremy J. Blum, Azim Eskandarian
openaire +1 more source
Re-thinking threat intelligence
2016 International Conference on Cyber Conflict (CyCon U.S.), 2016Attribution relies largely on technology; however, experts who rely on technology may inadvertently inject their own biases when evaluating findings. Attackers are now deceiving the analysts, by misleading them through the use of deceptive data and exploiting defender and analyst biases.
Char Sample +3 more
openaire +1 more source
Taxonomy of Threat Categorization and Threat Intelligence Platform
2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 2019This research is focused on analyzing existing threat taxonomies to identify which is suitable for bridging the gap between the non-technical and technical professionals following the four high-level objectives of the NIS.
Ahuokpeme Chibueze Brendan +1 more
openaire +1 more source
Intelligence Analyses and the Insider Threat
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2012In the intelligence community, the existence of a malicious insider poses a severe threat to information, to the actual analytic process, and, ultimately, to any decision-making process relying on such information and analyses. An analyst with malicious intent can create irreversible short-term, as well as long-term, damage that is hard to detect.
Eugene Santos +8 more
openaire +1 more source
Automating Threat Intelligence for SDL
2018 IEEE Cybersecurity Development (SecDev), 2018Threat intelligence is very important in order to execute a well-informed Security Development Lifecycle (SDL). Although there are many readily available solutions supporting tactical threat intelligence focusing on enterprise Information Technology (IT) infrastructure, the lack of threat intelligence solutions focusing on SDL is a known gap which is ...
Raghudeep Kannavara +4 more
openaire +1 more source
Artificial Intelligence in Cyber Threats Intelligence
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of ...
Roumen Trifonov +2 more
openaire +1 more source

