Results 21 to 30 of about 546,292 (293)
Assessing the Security of Campus Networks: The Case of Seven Universities
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid
Rui Zheng +4 more
doaj +1 more source
Intelligence, race, and psychological testing [PDF]
This chapter has two main goals: to update philosophers on the state of the art in the scientific psychology of intelligence, and to explain and evaluate challenges to the measurement invariance of intelligence tests. First, we provide a brief history of
Alfano, Mark +2 more
core +1 more source
Application of security threat intelligence based on big data analysis in telecom operators
As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to ...
Mingxia BO +3 more
doaj +2 more sources
Asymptotically Unambitious Artificial General Intelligence
General intelligence, the ability to solve arbitrary solvable problems, is supposed by many to be artificially constructible. Narrow intelligence, the ability to solve a given particularly difficult problem, has seen impressive recent development ...
Cohen, Michael K +2 more
core +1 more source
Cyber Security Threat Modeling for Supply Chain Organizational Environments
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution ...
Abel Yeboah-Ofori, Shareeful Islam
doaj +1 more source
How strong are international standards in practice? Evidence from cryptocurrency transactions
Despite widespread adoption of international anti-money laundering standards over the last 30 years, their effectiveness remains poorly understood due to persistent data limitations.
Karen Nershi
doaj +1 more source
COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in ...
Pantaleone Nespoli +3 more
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware [PDF]
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection.
Barker, Charity
core +1 more source
Is a Technological Singularity near also for bots in MMOGs? [PDF]
Using the idea of the Technological Singularity this essay offers some reflections on the possible future of bots in Massively Multiplayer Online Games (MMOGs). The paper starts by briefly introducing the notion of Technological Singularity as the advent
De Paoli, Stefano
core +2 more sources

