Network intrusion detection systems are useful tools that support system administrators in detecting various types of intrusions and play an important role in monitoring and analyzing …
C Aradau, T Blanke - European Journal of Social Theory, 2017 - journals.sagepub.com
From 'connecting the dots' and finding 'the needle in the haystack'to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the …
C Aradau, T Blanke - European Journal of International Security, 2018 - cambridge.org
As digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the …
P Aravamudhan - Plos one, 2023 - journals.plos.org
Cyber-attack is one of the most challenging aspects of information technology. After the emergence of the Internet of Things, which is a vast network of sensors, technology started …
N Michelsen, T Colley - European Journal of International Security, 2019 - cambridge.org
Communication has long been accepted as integral to the conduct of international affairs. The role that discourses, ideas, norms, and narratives play at the systemic level of world …
FM Llinares - IDP: revista de Internet, derecho y política= revista …, 2020 - dialnet.unirioja.es
The use of predictive AI tools to improve decision-making in relation to crime prevention and investigation is a reality. They are being implemented almost before we fully understand …
The ever-increasing number of Internet of Things (IoT) devices has created a new computing paradigm, called edge computing, where most of the computations are performed at the …
HN Abdoli, AJ Bidgoly, S Fallah - International Journal of Information …, 2022 - Springer
The using machine learning methods is one of the most important methods for creating and designing intrusion detection systems. Learning models can be taught according to the type …
The widespread integration of Internet of Things (IoT) devices across all facets of life has ushered in an era of interconnectedness, creating new avenues for cybersecurity challenges …