Results 31 to 40 of about 546,292 (293)

Fusion of Focal Loss’s cyber threat intelligence entity extraction

open access: yesTongxin xuebao, 2022
Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of ...
Yuanbo GUO   +4 more
doaj   +2 more sources

Human-as-a-security-sensor for harvesting threat intelligence

open access: yesCybersecurity, 2019
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth   +2 more
doaj   +1 more source

Prevent and Community Cohesion in Britain – The Worst of All Possible Worlds? [PDF]

open access: yes, 2014
This chapter offers a critical analysis of the UK’s Prevent programme to date, and argues that it has been ineffective, or even counter-productive because of a number of conceptual flaws and contradictions. In particular, the monocultural focus on entire,
Thomas, Paul
core   +1 more source

What’s International Law Got to Do With It? Transnational Law and the Intelligence Mission [PDF]

open access: yes, 2007
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately ...
Baker, James E.
core   +2 more sources

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

open access: yes, 2018
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam   +2 more
core   +1 more source

Atomic secrets and governmental lies : nuclear science, politics and security in the Pontecorvo case [PDF]

open access: yes, 2003
This paper focuses on the defection of nuclear physicist Bruno Pontecorvo from Britain to the USSR in 1950 in an attempt to understand how government and intelligence services assess threats deriving from the unwanted spread of secret scientific ...
Turchetti, Simone
core   +1 more source

New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study

open access: yesArthritis Care &Research, EarlyView.
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs   +15 more
wiley   +1 more source

Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering

open access: yesIEEE Access, 2020
Topic detection technology can automatically discover new topics on the Internet. This paper investigates domain-oriented feature extraction methods, and proposes a keyword feature extraction method ITFIDF-LP, a subject word feature extraction method LDA-
Xiaofeng Lu   +4 more
doaj   +1 more source

The impact of artificial intelligence on the current and future practice of clinical cancer genomics. [PDF]

open access: yes, 2019
Artificial intelligence (AI) is one of the most significant fields of development in the current digital age. Rapid advancements have raised speculation as to its potential benefits in a wide range of fields, with healthcare often at the forefront ...
Alice Garrett   +4 more
core   +1 more source

Trace Nickel Activated Biphasic Core‐CuOii/Shell‐CuOi Secondary Microspheres Enable Room Temperature Parts‐Per‐Trillion‐Level NO2 Detection

open access: yesAdvanced Engineering Materials, EarlyView.
An idea of designing novel sensors is proposed by creating appropriate Schottky barriers and vacancies between isomorphous Core‐CuOii/ Shell‐CuOi secondary microspheres and enhancing catalytic and spill‐over effects, and electronegativity via spontaneous biphasic separation, self‐assembly, and trace‐Ni‐doping.
Bala Ismail Adamu   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy