-
1
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…This software system would utilize and leverage on STIX’s, a structured language for cyber threat intelligence, expressiveness, flexibility, extensibility, automatability and human-readability to generate CTI reports that would increase the efficiency and productivity of ingesting CTIs. …”
Get full text
Final Year Project (FYP) -
2
Algorithmic discrimination and ethical perspective of artificial intelligence /
Published [202Subjects: “…Artificial intelligence…”
Get full text
text -
3
Threat intelligence using machine learning packet dissection
Published 2021Get full text
Conference or Workshop Item -
4
-
5
Recent Developments in Machine and Human Intelligence /
Published 2023“…The topics are crafted in such a way as to cover all the areas of artificial and human intelligence that require AI for further development. …”
Get full text
software, multimedia -
6
-
7
Ethical machines: The human-centric use of artificial intelligence
Published 2021Get full text
Article -
8
-
9
The attribution of creativity and agency to artificial intelligence
Published 2024Get full text
Final Year Project (FYP) -
10
Exploring the Intersection of AI and Human Resources Management /
Published [202Get full text
software, multimedia -
11
-
12
Framework of countermeasures (see: Anjuli Shere DPhil thesis, Chapter 8)
Published 2023Subjects:Dataset -
13
Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization /
Published 2023“…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
Get full text
Get full text
software, multimedia -
14
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. …”
Get full text
Book chapter -
15
Speaking to Angmohs : intelligibility and identity as motivators for speech accommodation in Singapore
Published 2019Get full text
Final Year Project (FYP) -
16
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
Get full text
Get full text
software, multimedia -
17
Artificial Intelligence in HCI : Second International Conference, AI-HCI 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021, Pr...
Published [202Subjects: “…Human-computer interaction…”
text -
18
-
19
Understanding the terrorist threat: a study on Iceland
Published 2015“…The paper analyses changes that Iceland needs to integrate within its current counter terrorism strategy as the terrorist threat becomes increasingly global. The various changes were identified through assessing why Iceland matters when discussing terrorism, the various threats that Iceland faces and the policies that Iceland need to follow to combat terrorism.…”
Get full text
Thesis -
20
Empathy Toward Artificial Intelligence Versus Human Experiences and the Role of Transparency in Mental Health and Social Support Chatbot Design: Comparative Study
Published 2025“…With the rise of generative artificial intelligence (AI) systems, mental health chatbots, and AI social support companions, it is important to understand how empathy unfolds toward stories from human versus AI narrators and how transparency plays a role in user emotions. …”
Get full text
Article