Results 31 to 40 of about 557,385 (336)
Intelligence, race, and psychological testing [PDF]
This chapter has two main goals: to update philosophers on the state of the art in the scientific psychology of intelligence, and to explain and evaluate challenges to the measurement invariance of intelligence tests. First, we provide a brief history of
Alfano, Mark +2 more
core +1 more source
The Potential Benefits and Challenges of a BRICS+ Agency for Cybersecurity Intelligence Exchange
The Brazil, Russia, India, China, South Africa (BRICS) nations lack a cohesive cybersecurity framework for intelligence exchange. The proposed expansion of the BRICS bloc calls for a BRICS+ agency dedicated to cybersecurity information sharing and ...
Masike Malatji, Walter Matli
doaj +1 more source
Cyber Security Threat Modeling for Supply Chain Organizational Environments
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution ...
Abel Yeboah-Ofori, Shareeful Islam
doaj +1 more source
Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges
Since several years, the overall awareness for the necessity to consider a vehicle as a potentially vulnerable system is facing accelerated growth. In 2015, the safety relevant exploitability of vulnerabilities through cyber attacks was exposed to a ...
Robin Bolz, Reiner Kriesten
doaj +1 more source
WLCG Security Operations Centres Working Group [PDF]
Security monitoring is an area of considerable interest for sites in the Worldwide LHC Computing Grid (WLCG), particularly as we move as a community towards the use of a growing range of computing models and facilities.
Crooks, David, Vâlsan, Liviu
core +1 more source
How strong are international standards in practice? Evidence from cryptocurrency transactions
Despite widespread adoption of international anti-money laundering standards over the last 30 years, their effectiveness remains poorly understood due to persistent data limitations.
Karen Nershi
doaj +1 more source
Unifying Cyber Threat Intelligence [PDF]
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to
Menges, Florian +2 more
openaire +2 more sources
COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in ...
Pantaleone Nespoli +3 more
doaj +1 more source
Assessing the Security of Campus Networks: The Case of Seven Universities
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid
Rui Zheng +4 more
doaj +1 more source
Prevent and Community Cohesion in Britain – The Worst of All Possible Worlds? [PDF]
This chapter offers a critical analysis of the UK’s Prevent programme to date, and argues that it has been ineffective, or even counter-productive because of a number of conceptual flaws and contradictions. In particular, the monocultural focus on entire,
Thomas, Paul
core +1 more source

