Results 31 to 40 of about 546,292 (293)
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of ...
Yuanbo GUO +4 more
doaj +2 more sources
Human-as-a-security-sensor for harvesting threat intelligence
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth +2 more
doaj +1 more source
Prevent and Community Cohesion in Britain – The Worst of All Possible Worlds? [PDF]
This chapter offers a critical analysis of the UK’s Prevent programme to date, and argues that it has been ineffective, or even counter-productive because of a number of conceptual flaws and contradictions. In particular, the monocultural focus on entire,
Thomas, Paul
core +1 more source
What’s International Law Got to Do With It? Transnational Law and the Intelligence Mission [PDF]
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately ...
Baker, James E.
core +2 more sources
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam +2 more
core +1 more source
Atomic secrets and governmental lies : nuclear science, politics and security in the Pontecorvo case [PDF]
This paper focuses on the defection of nuclear physicist Bruno Pontecorvo from Britain to the USSR in 1950 in an attempt to understand how government and intelligence services assess threats deriving from the unwanted spread of secret scientific ...
Turchetti, Simone
core +1 more source
New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs +15 more
wiley +1 more source
Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering
Topic detection technology can automatically discover new topics on the Internet. This paper investigates domain-oriented feature extraction methods, and proposes a keyword feature extraction method ITFIDF-LP, a subject word feature extraction method LDA-
Xiaofeng Lu +4 more
doaj +1 more source
The impact of artificial intelligence on the current and future practice of clinical cancer genomics. [PDF]
Artificial intelligence (AI) is one of the most significant fields of development in the current digital age. Rapid advancements have raised speculation as to its potential benefits in a wide range of fields, with healthcare often at the forefront ...
Alice Garrett +4 more
core +1 more source
An idea of designing novel sensors is proposed by creating appropriate Schottky barriers and vacancies between isomorphous Core‐CuOii/ Shell‐CuOi secondary microspheres and enhancing catalytic and spill‐over effects, and electronegativity via spontaneous biphasic separation, self‐assembly, and trace‐Ni‐doping.
Bala Ismail Adamu +8 more
wiley +1 more source

