Results 51 to 60 of about 552,762 (243)
Responding to the challenge of efficiently leveraging Open-source Threat Intelligence Feeds (OTIFs) to enhance organizational security, this paper presents an innovative approach to automated threat identification using machine learning.
Othmane Cherqi +3 more
doaj +1 more source
WLCG Security Operations Centres Working Group [PDF]
Security monitoring is an area of considerable interest for sites in the Worldwide LHC Computing Grid (WLCG), particularly as we move as a community towards the use of a growing range of computing models and facilities.
Crooks, David, Vâlsan, Liviu
core +1 more source
Rendition in the "War on Terror" [PDF]
The CIA’s rendition, detention and interrogation (RDI) programme was a central component of the first phase of the ‘war on terror’, from 2001-2008. Through constructing a global network of secret prisons, wherein hundreds of terror suspects were tortured,
Blakeley, Ruth, Raphael, Sam
core
From Intelligence gathering to Cyber Threat Detection [PDF]
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA +2 more
doaj
From Mare Nostrum to Insula Nostra : British Colonial Cyprus and the Italian Imperial Threat [PDF]
Peer ...
Xypolia, Ilia
core +1 more source
The threat intelligence platform is a security system that collects malicious feeds from different sources using help of a tool called intelMQ, the threat intelligence platform provides a solution for IT security networks through collecting and processing security feeds and stores the results in mango database.
NICHOLAS MASETE +5 more
openaire +1 more source
Arguments for exception in US security discourse [PDF]
In his influential State of Exception, Giorgio Agamben proposes that, even in apparently liberal western democracies, the state will routinely use the contingency of national emergency to suspend civil liberties and justify expansion of military and ...
Hunter, Duncan, MacDonald, Malcolm N
core +2 more sources
As the number of Common Vulnerabilities and Exposures (CVE) continues to grow exponentially, security teams face increasingly difficult decisions about prioritization.
Naoyuki Shimizu, Masaki Hashimoto
doaj +1 more source
Content and end-state-based alteration in the practice of political violence since the end of cold war: the difference between the terrorism of the cold war and the terrorism of al Qaeda: the rise of the "transcendental terrorist" [PDF]
For more than two generations the world was defined in international political terms by the label, the Cold War. This phrase was shorthand for many phenomena, including the division of the East and West into two blocs and the ideologicallybased ...
Gorka, Sebestyén
core
Reducing United States Military Involvement [PDF]
This paper addresses the effect that a tactical reduction of United States military personnel could potentially have on the threat of terrorism against the American homeland.
Pacheco, Nicolas
core +1 more source

