Search alternatives:
urban intelligence » human intelligence (Expand Search), ambient intelligence (Expand Search)
cyber intelligence » ambient intelligence (Expand Search)
Showing 1 - 20 results of 126 for search '((((urban intelligence) OR (cyber intelligence))) OR (threat intelligence))', query time: 0.14s Refine Results
  1. 1

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…In Cybersecurity operation, it is an important task to share Cyber Threat Intelligence (CTI). In order to facilitate CTI sharing, we need to have a flexible representation for these information. …”
    Get full text
    Final Year Project (FYP)
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Urban Visual Intelligence: Studying Cities with Artificial Intelligence and Street-Level Imagery by Zhang, Fan, Salazar-Miranda, Arianna, Duarte, Fábio, Vale, Lawrence, Hack, Gary, Chen, Min, Liu, Yu, Batty, Michael, Ratti, Carlo

    Published 2024
    “…A conceptual framework, urban visual intelligence, is introduced to systematically elaborate on how new image data sources and AI techniques are reshaping the way researchers perceive and measure cities, enabling the study of the physical environment and its interactions with the socioeconomic environment at various scales. …”
    Get full text
    Article
  9. 9
  10. 10

    Cyber-learning with cyber-instructors by Lok, Li Yin.

    Published 2011
    “…An intelligent chatbot has been designed and developed as a Cyber Tutor to aid the university students in their electronic learning. …”
    Get full text
    Final Year Project (FYP)
  11. 11

    Towards better urban intelligence: representation learning techniques for geospatial data analytics by Chen, Yile

    Published 2023
    “…These data sources attached to geospatial entities provide us great opportunities to apply data-driven techniques to understand urban dynamics, thus enhancing the urban intelligence and improving the quality of every individual’s life. …”
    Get full text
    Thesis-Doctor of Philosophy
  12. 12

    Building a cyber iron dome : Israel’s cyber defensive envelope by Raska, Michael

    Published 2015
    “…Israel is developing “a national cyber defensive envelope” – a multi-layered cyber defence strategy leveraging automated computerised systems and highly-trained personnel that provide intelligence, early warning, passive and active defence, and offensive capabilities across civil-military networks.…”
    Get full text
    Get full text
    Commentary
  13. 13

    Managing risks to the media from emerging networked technologies by Shere, ARK

    Published 2023
    Subjects: “…Cyber intelligence (Computer security)…”
    Thesis
  14. 14

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  15. 15
  16. 16

    The Importance of Bystanders in Threat Assessment and Management by Borum, Randy, Rowe, Mary

    Published 2025
    “…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. …”
    Get full text
    Book chapter
  17. 17

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
    Get full text
    Get full text
    software, multimedia
  18. 18
  19. 19

    Understanding the terrorist threat: a study on Iceland by Sigurour Orn Eyjolfsson

    Published 2015
    “…The paper analyses changes that Iceland needs to integrate within its current counter terrorism strategy as the terrorist threat becomes increasingly global. The various changes were identified through assessing why Iceland matters when discussing terrorism, the various threats that Iceland faces and the policies that Iceland need to follow to combat terrorism.…”
    Get full text
    Thesis
  20. 20

    Creativity in Intelligent Technologies and Data Science : 4th International Conference, CIT&DS 2021, Volgograd, Russia, September 20-23, 2021 : Proceedings / by CIT&DS (Conference) (4th : 2021 : Volgograd, Russia), organiser 642924, Kravets, Alla G., editor 642925, Shcherbakov, Maxim, editor 642926, Parygin, Danila, editor 642927, Groumpos, Peter P., editor 642928

    Published [202
    “…The papers are organized in the following topical sections: Artificial intelligence and deep learning technologies: knowledge discovery in patent and open sources; open science semantic technologies; IoT and computer vision in knowledge-based control; Cyber-physical systems and big data-driven control: pro-active modeling in intelligent decision making support; design creativity in CASE/CAI/CAD/PDM; intelligent technologies in urban design and computing; Intelligent technologies in social engineering: data science in social networks analysis and cyber security; educational creativity and game-based learning; intelligent assistive technologies: software design and application.…”
    text