Results 31 to 40 of about 552,762 (243)

COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things

open access: yesSensors, 2019
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in ...
Pantaleone Nespoli   +3 more
doaj   +1 more source

Atomic secrets and governmental lies : nuclear science, politics and security in the Pontecorvo case [PDF]

open access: yes, 2003
This paper focuses on the defection of nuclear physicist Bruno Pontecorvo from Britain to the USSR in 1950 in an attempt to understand how government and intelligence services assess threats deriving from the unwanted spread of secret scientific ...
Turchetti, Simone
core   +1 more source

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

open access: yes, 2018
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam   +2 more
core   +1 more source

Fusion of Focal Loss’s cyber threat intelligence entity extraction

open access: yesTongxin xuebao, 2022
Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of ...
Yuanbo GUO   +4 more
doaj   +2 more sources

The impact of artificial intelligence on the current and future practice of clinical cancer genomics. [PDF]

open access: yes, 2019
Artificial intelligence (AI) is one of the most significant fields of development in the current digital age. Rapid advancements have raised speculation as to its potential benefits in a wide range of fields, with healthcare often at the forefront ...
Alice Garrett   +4 more
core   +1 more source

What’s International Law Got to Do With It? Transnational Law and the Intelligence Mission [PDF]

open access: yes, 2007
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately ...
Baker, James E.
core   +2 more sources

Prevent and Community Cohesion in Britain – The Worst of All Possible Worlds? [PDF]

open access: yes, 2014
This chapter offers a critical analysis of the UK’s Prevent programme to date, and argues that it has been ineffective, or even counter-productive because of a number of conceptual flaws and contradictions. In particular, the monocultural focus on entire,
Thomas, Paul
core   +1 more source

Techniques and Implementation of High-Quality Threat Intelligence Acquisition from the Dark Web [PDF]

open access: yesJisuanji gongcheng
There is a large amount of hidden information about cyber attacks or cybercrime in the dark web. Previous studies have mainly focused on analyzing general open source threat intelligence or working on a certain aspect of the dark web threat intelligence,
WANG Yilei, SUN Xin, HAN Jiajia, GUO Shaohua, HU Yuelin, ZOU Futai
doaj   +1 more source

Cybercrime threat intelligence

open access: yesComputers and Security, 2021
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. To offer an overview of the techniques and indicators to perform cyber crime detection by means of more complex machine- and deep-learning investigations as well as similar threat intelligence and engineering activities over ...
Cascavilla, Giuseppe   +2 more
openaire   +1 more source

Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering

open access: yesIEEE Access, 2020
Topic detection technology can automatically discover new topics on the Internet. This paper investigates domain-oriented feature extraction methods, and proposes a keyword feature extraction method ITFIDF-LP, a subject word feature extraction method LDA-
Xiaofeng Lu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy