Results 41 to 50 of about 557,385 (336)
Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware [PDF]
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection.
Barker, Charity
core +1 more source
Human-as-a-security-sensor for harvesting threat intelligence
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth +2 more
doaj +1 more source
From Intelligence gathering to Cyber Threat Detection [PDF]
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA +2 more
doaj
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar +13 more
core +2 more sources
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of ...
Yuanbo GUO +4 more
doaj +2 more sources
Engineering Strategies for Stable and Long‐Life Alkaline Zinc‐Based Flow Batteries
Alkaline zinc‐based flow batteries face persistent challenges from unstable zinc deposition, including dendrite growth, passivation, corrosion, and hydrogen evolution, which severely limit cycling stability. Current research addresses these issues through coordinated electrode structuring, electrolyte regulation, and membrane design to control zinc ...
Yuran Bai +6 more
wiley +1 more source
Cyber Threat Intelligence [PDF]
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
+5 more sources
What’s International Law Got to Do With It? Transnational Law and the Intelligence Mission [PDF]
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately ...
Baker, James E.
core +2 more sources
A Zn2+‐coordinated poly(vinylidene fluoride) binder is shown to suppress Jahn–Teller‐driven Mn dissolution while improving dispersion, wettability, and structural integrity in thick MnO2 cathodes. This simple binder‐engineering strategy enables high‐loading aqueous Zn‐ion batteries with enhanced areal capacity, cycling stability, and practical promise ...
Insung Jang, Geun Yoo, Geon−Hyoung An
wiley +1 more source
Techniques and Implementation of High-Quality Threat Intelligence Acquisition from the Dark Web [PDF]
There is a large amount of hidden information about cyber attacks or cybercrime in the dark web. Previous studies have mainly focused on analyzing general open source threat intelligence or working on a certain aspect of the dark web threat intelligence,
WANG Yilei, SUN Xin, HAN Jiajia, GUO Shaohua, HU Yuelin, ZOU Futai
doaj +1 more source

