Results 21 to 30 of about 546,292 (293)

Assessing the Security of Campus Networks: The Case of Seven Universities

open access: yesSensors, 2021
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid
Rui Zheng   +4 more
doaj   +1 more source

Intelligence, race, and psychological testing [PDF]

open access: yes, 2016
This chapter has two main goals: to update philosophers on the state of the art in the scientific psychology of intelligence, and to explain and evaluate challenges to the measurement invariance of intelligence tests. First, we provide a brief history of
Alfano, Mark   +2 more
core   +1 more source

Application of security threat intelligence based on big data analysis in telecom operators

open access: yesDianxin kexue, 2020
As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to ...
Mingxia BO   +3 more
doaj   +2 more sources

Asymptotically Unambitious Artificial General Intelligence

open access: yes, 2020
General intelligence, the ability to solve arbitrary solvable problems, is supposed by many to be artificially constructible. Narrow intelligence, the ability to solve a given particularly difficult problem, has seen impressive recent development ...
Cohen, Michael K   +2 more
core   +1 more source

Cyber Security Threat Modeling for Supply Chain Organizational Environments

open access: yesFuture Internet, 2019
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution ...
Abel Yeboah-Ofori, Shareeful Islam
doaj   +1 more source

How strong are international standards in practice? Evidence from cryptocurrency transactions

open access: yesPolitical Science Research and Methods
Despite widespread adoption of international anti-money laundering standards over the last 30 years, their effectiveness remains poorly understood due to persistent data limitations.
Karen Nershi
doaj   +1 more source

COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things

open access: yesSensors, 2019
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in ...
Pantaleone Nespoli   +3 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware [PDF]

open access: yes, 2020
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection.
Barker, Charity
core   +1 more source

Is a Technological Singularity near also for bots in MMOGs? [PDF]

open access: yes, 2015
Using the idea of the Technological Singularity this essay offers some reflections on the possible future of bots in Massively Multiplayer Online Games (MMOGs). The paper starts by briefly introducing the notion of Technological Singularity as the advent
De Paoli, Stefano
core   +2 more sources

Home - About - Disclaimer - Privacy