Search alternatives:
human intelligence » urban intelligence (Expand Search)
cyber intelligence » ambient intelligence (Expand Search)
Showing 21 - 40 results of 346 for search '((human intelligence) OR (((threat intelligence) OR (cyber intelligence))))', query time: 0.15s Refine Results
  1. 21

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  2. 22

    The Importance of Bystanders in Threat Assessment and Management by Borum, Randy, Rowe, Mary

    Published 2025
    “…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. …”
    Get full text
    Book chapter
  3. 23
  4. 24

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
    Get full text
    Get full text
    software, multimedia
  5. 25
  6. 26
  7. 27

    Understanding the terrorist threat: a study on Iceland by Sigurour Orn Eyjolfsson

    Published 2015
    “…The paper analyses changes that Iceland needs to integrate within its current counter terrorism strategy as the terrorist threat becomes increasingly global. The various changes were identified through assessing why Iceland matters when discussing terrorism, the various threats that Iceland faces and the policies that Iceland need to follow to combat terrorism.…”
    Get full text
    Thesis
  8. 28

    Intelligent Technologies for Interactive Entertainment : 12th EAI international conference, INTETAIN 2020, virtual event, December 12-14, 2020 : Proceedings / by INTETAIN (Conference) (12th : 2020 : Online), organiser 642911, Shaghaghi, Navid, editor 642912, Lamberti, Fabrizio, editor 642913, Beams, Brian, editor 642914, Shariatmadari, Reza, editor 642915, Amer, Ahmed, editor 642916

    Published [202
    “…The 19 full papers were selected from 49 submissions and present novel, and innovative work in areas including in art, science, design and engineering regarding computer-based systems or devices that provide intelligent human interaction or entertainment experience. …”
    text
  9. 29

    Empathy Toward Artificial Intelligence Versus Human Experiences and the Role of Transparency in Mental Health and Social Support Chatbot Design: Comparative Study by Shen, Jocelyn, DiPaola, Daniella, Ali, Safinah, Sap, Maarten, Park, Hae Won, Breazeal, Cynthia

    Published 2025
    “…With the rise of generative artificial intelligence (AI) systems, mental health chatbots, and AI social support companions, it is important to understand how empathy unfolds toward stories from human versus AI narrators and how transparency plays a role in user emotions. …”
    Get full text
    Article
  10. 30
  11. 31

    Urban Visual Intelligence: Studying Cities with Artificial Intelligence and Street-Level Imagery by Zhang, Fan, Salazar-Miranda, Arianna, Duarte, Fábio, Vale, Lawrence, Hack, Gary, Chen, Min, Liu, Yu, Batty, Michael, Ratti, Carlo

    Published 2024
    “…Several decades later, big data and artificial intelligence (AI) are revolutionizing how people move, sense, and interact with cities. …”
    Get full text
    Article
  12. 32

    Intelligence failure in U.S. counterterrorism by King, Brian Allen

    Published 2024
    “…This is significant because it supports the conclusion that more can be done in the analytical and information sharing domains to prevent al-Qaeda and insider threat attacks, while supporting the idea that state-sponsored attacks will be less likely to have data available to connect prior to an attack due to the higher degree of professionalism and advanced operational security resources available to government intelligence services supporting the attack planning.…”
    Get full text
    Thesis-Doctor of Philosophy
  13. 33

    Intelligent Portable Traffic Light by Monica, Josephine

    Published 2016
    “…This manual approach has at least two draw backs: Waste of human resources. Limited communication between the two faraway workers (especially in a big construction area). …”
    Get full text
    Get full text
    Student Research Poster
  14. 34
  15. 35

    Employee profiling via aspect-based sentiment and network for insider threats detection by Soh, Charlie, Yu, Sicheng, Narayanan, Annamalai, Duraisamy, Santhiya, Chen, Lihui

    Published 2020
    “…The profiles obtained from our framework can also be used to complement any existing expert and intelligent systems with additional capabilities in handling textual information such as, integration with profiles obtained from biometric behavior to form a more comprehensive threat detection system.…”
    Get full text
    Journal Article
  16. 36
  17. 37

    Human Brain and Artificial Intelligence : Second International Workshop, HBAI 2020, Held in Conjunction with IJCAI-PRICAI 2020, Yokohama, Japan, January 7, 2021, Revised Selected Papers / by HBAI (Conference) (2nd : 2021 : Online), organiser 643011, Wang, Yueming, editor 545496

    Published [202
    “…This book constitutes the refereed proceedings of the Second International Workshop on Human Brain and Artificial Intelligence, HBAI 2020, held in conjunction with IJCAI-PRICAI 2020, Kyoto, Japan, in January 2021. …”
    text
  18. 38

    The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Mohd Zamri, Osman, Alanda, Alde, Erianda, Aldo, Shahreen, Kasim, Mohd Faizal, Ab Razak

    Published 2024
    “…Deep learning is a machine learning technology that allows computational models to learn via experience, mimicking human cognitive processes. This method is critical in the development of identifying certain objects, and provides the computational intelligence required to identify multiple objects and distinguish it between object A or Object B. …”
    Get full text
    Article
  19. 39
  20. 40