Results 51 to 60 of about 552,762 (243)

Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning

open access: yesIEEE Access, 2023
Responding to the challenge of efficiently leveraging Open-source Threat Intelligence Feeds (OTIFs) to enhance organizational security, this paper presents an innovative approach to automated threat identification using machine learning.
Othmane Cherqi   +3 more
doaj   +1 more source

WLCG Security Operations Centres Working Group [PDF]

open access: yes, 2017
Security monitoring is an area of considerable interest for sites in the Worldwide LHC Computing Grid (WLCG), particularly as we move as a community towards the use of a growing range of computing models and facilities.
Crooks, David, Vâlsan, Liviu
core   +1 more source

Rendition in the "War on Terror" [PDF]

open access: yes, 2016
The CIA’s rendition, detention and interrogation (RDI) programme was a central component of the first phase of the ‘war on terror’, from 2001-2008. Through constructing a global network of secret prisons, wherein hundreds of terror suspects were tortured,
Blakeley, Ruth, Raphael, Sam
core  

From Intelligence gathering to Cyber Threat Detection [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA   +2 more
doaj  

Threat Intelligence Platform

open access: yes, 2018
The threat intelligence platform is a security system that collects malicious feeds from different sources using help of a tool called intelMQ, the threat intelligence platform provides a solution for IT security networks through collecting and processing security feeds and stores the results in mango database.
NICHOLAS MASETE   +5 more
openaire   +1 more source

Arguments for exception in US security discourse [PDF]

open access: yes, 2017
In his influential State of Exception, Giorgio Agamben proposes that, even in apparently liberal western democracies, the state will routinely use the contingency of national emergency to suspend civil liberties and justify expansion of military and ...
Hunter, Duncan, MacDonald, Malcolm N
core   +2 more sources

Vulnerability Management Chaining: An Integrated Framework for Efficient Cybersecurity Risk Prioritization

open access: yesIEEE Access
As the number of Common Vulnerabilities and Exposures (CVE) continues to grow exponentially, security teams face increasingly difficult decisions about prioritization.
Naoyuki Shimizu, Masaki Hashimoto
doaj   +1 more source

Content and end-state-based alteration in the practice of political violence since the end of cold war: the difference between the terrorism of the cold war and the terrorism of al Qaeda: the rise of the "transcendental terrorist" [PDF]

open access: yes, 2008
For more than two generations the world was defined in international political terms by the label, the Cold War. This phrase was shorthand for many phenomena, including the division of the East and West into two blocs and the ideologicallybased ...
Gorka, Sebestyén
core  

Reducing United States Military Involvement [PDF]

open access: yes, 2014
This paper addresses the effect that a tactical reduction of United States military personnel could potentially have on the threat of terrorism against the American homeland.
Pacheco, Nicolas
core   +1 more source

Home - About - Disclaimer - Privacy