Results 51 to 60 of about 546,292 (293)

APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2021
With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource.
Bohdan Nikolaienko, Serhii Vasylenko
doaj   +1 more source

Directional Liquid Transport Enabled pH‐Responsive Hierarchical Composite for Enhanced Wound Healing

open access: yesAdvanced Healthcare Materials, EarlyView.
A hierarchical composite with a gradient architecture transitioning from hydrophobic to hydrophilic layers integrates diode‐like liquid transport, efficient water absorption, breathability, and mechanical robustness. This device enables a multifunctional therapeutic platform with pH‐responsive dual‐drug release, providing synergistic anti‐inflammatory ...
Baolin Wang   +5 more
wiley   +1 more source

Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning

open access: yesIEEE Access, 2023
Responding to the challenge of efficiently leveraging Open-source Threat Intelligence Feeds (OTIFs) to enhance organizational security, this paper presents an innovative approach to automated threat identification using machine learning.
Othmane Cherqi   +3 more
doaj   +1 more source

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Unstructured Big Data Threat Intelligence Parallel Mining Algorithm

open access: yesBig Data Mining and Analytics
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on the web, we have developed the Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm.
Zhihua Li   +3 more
doaj   +1 more source

Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing

open access: yesIEEE Access, 2022
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic.
Hatma Suryotrisongko   +3 more
doaj   +1 more source

Surprise, Intelligence Failure, and Mass Casualty Terrorism [PDF]

open access: yes, 2006
This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors - failures of public policy leadership, analytical challenges, organizational obstacles,
Copeland, Thomas Edgar
core  

Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy

open access: yesAdvanced Materials, EarlyView.
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa   +3 more
wiley   +1 more source

From Intelligence gathering to Cyber Threat Detection [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA   +2 more
doaj  

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy