Results 41 to 50 of about 557,385 (336)

Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware [PDF]

open access: yes, 2020
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection.
Barker, Charity
core   +1 more source

Human-as-a-security-sensor for harvesting threat intelligence

open access: yesCybersecurity, 2019
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth   +2 more
doaj   +1 more source

From Intelligence gathering to Cyber Threat Detection [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA   +2 more
doaj  

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Fusion of Focal Loss’s cyber threat intelligence entity extraction

open access: yesTongxin xuebao, 2022
Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of ...
Yuanbo GUO   +4 more
doaj   +2 more sources

Engineering Strategies for Stable and Long‐Life Alkaline Zinc‐Based Flow Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Alkaline zinc‐based flow batteries face persistent challenges from unstable zinc deposition, including dendrite growth, passivation, corrosion, and hydrogen evolution, which severely limit cycling stability. Current research addresses these issues through coordinated electrode structuring, electrolyte regulation, and membrane design to control zinc ...
Yuran Bai   +6 more
wiley   +1 more source

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
  +5 more sources

What’s International Law Got to Do With It? Transnational Law and the Intelligence Mission [PDF]

open access: yes, 2007
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately ...
Baker, James E.
core   +2 more sources

Binder Engineering Suppresses Jahn–Teller‐Driven Mn Dissolution and Enables High‐Loading MnO2 Cathodes for Aqueous Zn‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A Zn2+‐coordinated poly(vinylidene fluoride) binder is shown to suppress Jahn–Teller‐driven Mn dissolution while improving dispersion, wettability, and structural integrity in thick MnO2 cathodes. This simple binder‐engineering strategy enables high‐loading aqueous Zn‐ion batteries with enhanced areal capacity, cycling stability, and practical promise ...
Insung Jang, Geun Yoo, Geon−Hyoung An
wiley   +1 more source

Techniques and Implementation of High-Quality Threat Intelligence Acquisition from the Dark Web [PDF]

open access: yesJisuanji gongcheng
There is a large amount of hidden information about cyber attacks or cybercrime in the dark web. Previous studies have mainly focused on analyzing general open source threat intelligence or working on a certain aspect of the dark web threat intelligence,
WANG Yilei, SUN Xin, HAN Jiajia, GUO Shaohua, HU Yuelin, ZOU Futai
doaj   +1 more source

Home - About - Disclaimer - Privacy