Results for 'Cyber conflicts '

966 found
Order:
  1. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  2. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans although information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Targeted Human Trafficking -- The Wars between Proxy and Surrogated Economy.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):398-409.
    Upon Brexit & Trade War, the research took a supply-side analysis in macroeconomic paradigm for the purpose and cause of the actions. In the geopolitical competitions on crude oil resources between the allied powers & the Russian hegemony, the latter of which has effective control over P. R. China’s multilateral behaviors, the external research induced that trade war, either by complete information in intelligence or an unintended result, was a supply chain attack in prohibiting the antisatellite weapon supplies in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. A socio-psychological approach towards terrorism: How and why do individuals support, join, stay in, and leave terrorist organizations?Alireza Salehi-Nejad - 2019 - In International Conference on Peace and Conflict Resolution. Tehran: University of Tehran.
    The phenomena of terrorism and other politically motivated violence have been assessed across different disciplines from political science and economics to theology and psychology. Whereas the definitions of the concepts of “terrorism” and “terrorist” are disputed and they rather reflect the perspectives of the defining entity, there is a common consensus that terrorism can be classified in terms of its type (such as state-sponsored, dissent, religious, pathological, narco-, cyber-, and bioterrorism), the scale (i.e. domestic vs. international), motives, and objectives. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Electronic Warfare and Artificial Intelligence.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    Electronic warfare is a critical component of modern military operations and has undergone significant advances in recent years. This book provides an overview of electronic warfare, its historical development, key components, and its role in contemporary conflict scenarios. It also discusses emerging trends and challenges in electronic warfare and its contemporary relevance in an era of advanced technology and cyber threats, emphasizing the need for continued research and development in this area. The book explores the burgeoning intersection of artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  41
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. (1 other version)AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  26
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Conflicting Intuitions.Joshua Knobe - forthcoming - Ergo: An Open Access Journal of Philosophy.
    Research on intuitions about philosophical thought experiments shows a striking pattern. Often, there are powerful intuitions on one side and also powerful intuitions on the exact opposite side. A question now arises about how to understand this pattern. One possible view would be that it is primarily a matter of different people having different intuitions. I present evidence for the view that this is not the correct understanding. Instead, I suggest, it is primarily a matter of individual people having *conflicting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  37
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  18. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Normative Conflicts and the Structure of Normativity.Andrew Reisner - 2015 - In Iwao Hirose & Andrew Evan Reisner (eds.), Weighing and Reasoning: Themes From the Philosophy of John Broome. New York, NY: Oxford University Press UK.
    This paper considers the relation between the sources of normativity, reasons, and normative conflicts. It argues that common views about how normative reasons relate to their sources have important consequences for how we can understand putative normative conflicts.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  20. Intergroup conflicts in human evolution: A critical review of the parochial altruism model(人間進化における集団間紛争 ―偏狭な利他性モデルを中心に―).Hisashi Nakao, Kohei Tamura & Tomomi Nakagawa - 2023 - Japanese Psychological Review 65 (2):119-134.
    The evolution of altruism in human societies has been intensively investigated in social and natural sciences. A widely acknowledged recent idea is the “parochial altruism model,” which suggests that inter- group hostility and intragroup altruism can coevolve through lethal intergroup conflicts. The current article critically examines this idea by reviewing research relevant to intergroup conflicts in human evolutionary history from evolutionary biology, psychology, cultural anthropology, and archaeology. After a brief intro- duction, section 2 illustrates the mathematical model of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  22. Conflict, socialism, and democracy in Mill.Gustavo H. Dalaqua - 2019 - Télos 22 (1-2):33-59.
    Mill’s socialism and democratic theory have led some scholars to accuse him of trying to eliminate conflict from political life. Whereas Graeme Duncan has averred that Mill’s socialism aims to institute a completely harmonious society, James Fitzjames Stephen has contended that Millian democracy sought to evacuate conflict from political discussion. This article reconstructs both critiques and argues they are imprecise. Even if disputes motivated by redistribution of material goods would no longer exist in an egalitarian society, conflicts driven by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Conflicts and Birth Weight.Hang Khanh, My Nguyen, Thuy Trang, Khoi Duc, Kien Le & Huong T. T. Hoang - 2016
    This pаpеr invеstigаtеs thе hiddеn yеt pеrsistеnt cоst оf cоnflict tо birth wеight оutcоmеs fоr 53 dеvеlоping cоuntriеs еxpеriеncing cоnflict in thе pаst thrее dеcаdеs (1990-2018). Explоiting thе vаriаtiоn аcrоss districts аnd cоncеptiоn mоnths-yеаrs, wе find thаt intrаutеrinе еxpоsurе tо аrmеd cоnflict in thе first trimеstеr оf prеgnаncy rеducеs child’s wеight аt birth by 2.8% аnd rаisеs thе incidеncе оf lоw birth wеight by 3.2 pеrcеntаgе pоints. Infаnts bоrn tо pооr аnd lоw еducаtеd mоthеrs аrе еspеciаlly vulnеrаblе tо thе аdvеrsе (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  24. Healthy Conflict in Contemporary American Society: From Enemy to Adversary.Jason A. Springs - 2018 - Cambridge: Cambridge University Press.
    US citizens perceive their society to be one of the most diverse and religiously tolerant in the world today. Yet seemingly intractable religious intolerance and moral conflict abound throughout contemporary US public life - from abortion law battles, same-sex marriage, post-9/11 Islamophobia, public school curriculum controversies, to moral and religious dimensions of the Black Lives Matter and Occupy Wall Street movements, and Tea Party populism. Healthy Conflict in Contemporary American Society develops an approach to democratic discourse and coalition-building across deep (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25. Conflicting reasons, unconflicting ‘ought’s.Shyam Nair - 2016 - Philosophical Studies 173 (3):629-663.
    One of the popular albeit controversial ideas in the last century of moral philosophy is that what we ought to do is explained by our reasons. And one of the central features of reasons that accounts for their popularity among normative theorists is that they can conflict. But I argue that the fact that reasons conflict actually also poses two closely related problems for this popular idea in moral philosophy. The first problem is a generalization of a problem in deontic (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  26. Conflict management strategies and secondary school teachers’ job effectiveness in Obubra Local Government Area of Cross River State, Nigeria.Valentine Joseph Owan - 2018 - Dissertation, University of Calabar, Calabar, Nigeria
    The study investigated conflict management strategies and secondary school teachers’ job effectiveness in Obubra Local Government Area of Cross River State. Six null hypotheses were formulated to guide the study. The study adopted correlational and factorial research designs. Purposive sampling technique was used to select a sample of 222 teachers from a population of 352 secondary school teachers. Conflict Management Strategies Questionnaire (CMSQ) and Secondary School Teachers’ Job Effectiveness Questionnaire (SSTJEQ) were used respectively, as instruments for data collection. The hypotheses (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  27. Communication, Conflict and Cooperation.Steffen Borge - 2012 - ProtoSociology 29.
    According to Steven Pinker and his associates the cooperative model of human communication fails, because evolutionary biology teaches us that most social relationships, including talk-exchange, involve combinations of cooperation and conflict. In particular, the phenomenon of the strategic speaker who uses indirect speech in order to be able to deny what he meant by a speech act (deniability of conversational implicatures) challenges the model. In reply I point out that interlocutors can aim at understanding each other (cooperation), while being in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Conflicts of Normativity.Andrew Reisner - 2004 - Dissertation, University of Oxford
    The thesis contains my early work arguing against evidentialism for reasons for belief (chapter 1), my early argument that rationality is not normative (chapter 2), an argument that rationality is not responding reasons, at least understood in one way (chapter 2), a general discussion of how normative conflicts might (appear to) arise in many different ways (chapter 3), a discussion of how to weigh pragmatic and evidential reasons for belief (chapter 4), and a discussion of the general structure of (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  31.  83
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Administrators’ conflict management strategies utilization and job effectiveness of secondary school teachers in Obubra Local Government Area, Cross River State, Nigeria.Festus Obun Arop, Valentine Joseph Owan & Martin Akan Ekpang - 2018 - IIARD International Journal of Economics and Business Management 4 (7):11-21.
    The study investigated administrators’ conflict management strategies utilization and job effectiveness of secondary school teachers in Obubra Local Government Area, Cross River State, Nigeria. Two research questions and null hypotheses were developed to guide the study. The study adopted factorial research design. Census technique was used in selecting the entire population of 464 secondary school teachers in the area. Conflict Management Strategies Utilization Questionnaire (CMSUQ) and Secondary School Teachers’ Job Effectiveness Questionnaire (SSTJEQ) were used respectively, as instruments for data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Conflicting Aims and Values in the Application of Smart Sensors in Geriatric Rehabilitation: Ethical Analysis.Christopher Predel, Cristian Timmermann, Frank Ursin, Marcin Orzechowski, Timo Ropinski & Florian Steger - 2022 - JMIR mHealth and uHealth 10 (6):e32910.
    Background: Smart sensors have been developed as diagnostic tools for rehabilitation to cover an increasing number of geriatric patients. They promise to enable an objective assessment of complex movement patterns. -/- Objective: This research aimed to identify and analyze the conflicting ethical values associated with smart sensors in geriatric rehabilitation and provide ethical guidance on the best use of smart sensors to all stakeholders, including technology developers, health professionals, patients, and health authorities. -/- Methods: On the basis of a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Reference Letters and Conflict of Interest: A Professor’s Dilemma.Bryn Williams-Jones - 2012 - BioéthiqueOnline 1:10.
    This case study examines some of the challenges, and in particular conflicts of interest, that professors face in writing letters of reference for their students.
    Download  
     
    Export citation  
     
    Bookmark  
  35. The conflicted character of picture perception.Boyd Millar - 2006 - Journal of Aesthetics and Art Criticism 64 (4):471–477.
    It is often assumed that there is a perceptual conflict in looking at a picture since one sees both a two-dimensional surface and a three-dimensional scene simultaneously. In this paper, I argue that it is a mistake to think that looking at pictures requires the visual system to perform the special task of reconciling inconsistent impressions of space, or competing information from different depth cues. To the contrary, I suggest that there are good reasons to think that the perception of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Conflict Management in Inter-Governmental Relations in Nigeria: Issues and Prospects.Emmanuel Chima, Mojirayo Bukola Bello, Fidelis Obasi Okoroafor & Ogbulafor I. Obilor - 2019 - GNOSI: An Interdisciplinary Journal of Human Theory and Praxis 1 (1):16-22.
    Intergovernmental relation is an interaction among different levels of government. Intergovernmental relation is often times conflict-ridden, and the extent of the conflict depends on how they are managed by the actor operating at the government levels. This study examines conflict management in intergovernmental relation in Nigeria. The content analysis method would be used. This will be carried out by analyzing data obtained from extant literature on the subject matter. This paper found that intergovernmental conflicts mainly borders on tax jurisdiction (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Norm Conflicts and Epistemic Modals.Niels Skovgaard-Olsen & John Cantwell - 2023 - Cognitive Psychology 145 (101591):1-30.
    Statements containing epistemic modals (e.g., “by spring 2023 most European countries may have the Covid-19 pandemic under control”) are common expressions of epistemic uncertainty. In this paper, previous published findings (Knobe & Yalcin, 2014; Khoo & Phillips, 2018) on the opposition between Contextualism and Relativism for epistemic modals are re-examined. It is found that these findings contain a substantial degree of individual variation. To investigate whether participants differ in their interpretation of epistemic modals, an experiment with multiple phases and sessions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Conflict of Interpretations as an Essential Epistemological Tool for Women’s Studies.Fernanda Henriques - 2019 - Critical Hermeneutics 3:109-134.
    This paper aims to show how Paul Ricoeur's hermeneutics, namely in the specificity of the Conflict of interpretations category, is a fruitful resource in the constitution of Women's Studies as well as to legitimize the need for its full integration in the canons of humanistic knowledge. In general, they continue to ignore the immense body of knowledge and perspectives that Women's Studies have produced in recent decades. In this sense, it begins by presenting the general features of the hermeneutic problematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  40
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Conflict Contagion.Marie Oldfield - 2015 - Institute of Mathematics and its Applications 1.
    With an increased emphasis on upstream activity and Defence Engagement, it has become increasingly more important for the UK Ministry of Defence (MOD) and government to understand the relationship between conflict and regional instability. As part of this process, the Historical and Operational Data Analysis Team (HODA) in Defence Science and Technology Laboratory (Dstl) was tasked to look at factors that influenced the regional spread of internal conflicts to help aid the decision making of government. Conflict contagion is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Conflict Creates an Unconscious Id.Jim Hopkins - 2013 - Neuropsychoanalysis 15.
    This note is part of a discussion of Mark Solm's 'The Conscious Id'. -/- It seconds Solms' claim that recent work in neuroscience indicates that the subcortical mechanisms that generate motives also generate consciousness, and that his enables us to integrate neuroscience with the Freudian Ego and Id. -/- Still this is not reason to regard the Id as conscious. If we take full account of the role of conflict, as described in terms of the Freudian superego, we can see (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Healthy Conflict in an Era of Intractability: Reply to Four Critical Responses.Jason A. Springs - 2020 - Journal of Religious Ethics 48 (2):316-341.
    This essay responds to four critical essays by Rosemary Kellison, Ebrahim Moosa, Joseph Winters, and Martin Kavka on the author’s recent book, Healthy Conflict in Contemporary American Society: From Enemy to Adversary (Cambridge, 2018). Parts I and II work in tandem to further develop my accounts of strategic empathy and agonistic political friendship. I defend against criticisms that my argument for moral imagination obligates oppressed people to empathize with their oppressors. I argue, further, that healthy conflict can be motivated by (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Conflict Management and Communication Styles of Educational Leaders in Guangdong Business and Technology University: Towards a Leadership Development Training Program.Fuchun Lin - 2023 - International Journal of Open-Access, Interdisciplinary and New Educational Discoveries of ETCOR Educational Research Center 2 (1):128-165.
    Aim: This study determined the relationship between the assessed conflict management and communication styles of the university leaders of Guangdong Business and Technology University in China towards a leadership development training program. -/- Methodology: This study adopted a descriptive quantitative- comparative- correlational research design. It was conducted during the second semester of school year 2021-2022. The data gathered were collated and treated using the Statistical Package for Social Sciences or SPSS software. -/- Results: Based on the results, the most evident (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Consequences of Reasoning with Conflicting Obligations.Shyam Nair - 2014 - Mind 123 (491):753-790.
    Since at least the 1960s, deontic logicians and ethicists have worried about whether there can be normative systems that allow conflicting obligations. Surprisingly, however, little direct attention has been paid to questions about how we may reason with conflicting obligations. In this paper, I present a problem for making sense of reasoning with conflicting obligations and argue that no deontic logic can solve this problem. I then develop an account of reasoning based on the popular idea in ethics that reasons (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  46. Climate Change and Social Conflicts.Richard Sťahel - 2016 - Perspectives on Global Development and Technology 15:480-496.
    This article outlines the role of globalized mass media in the perception of environmental and social threats and its reciprocal conditionality in the globalized society. It examines the reasons why the global environmental crisis will not lead to a world-wide environmental movement for change of the basic imperatives of the world economicpolitical system. Coherency between globalized mass media and wide-spreading of consumer lifestyle exists despite the fact that it deepens the devastation of environment and social conflicts. Globalized mass media (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Conflicting Grammatical Appearances.Guy Longworth - 2007 - Croatian Journal of Philosophy 21 (3):403-426.
    I explore one apparent source of conflict between our naïve view of grammatical properties and the best available scientific view of grammatical properties. That source is the modal dependence of the range of naïve, or manifest, grammatical properties that is available to a speaker upon the configurations and operations of their internal systems—that is, upon scientific grammatical properties. Modal dependence underwrites the possibility of conflicting grammatical appearances. In response to that possibility, I outline a compatibilist strategy, according to which the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Between conflict and consensus: Why democracy needs conflicts and why communities should delimit their intensity.Szilvia Horváth - 2018 - Zeitschrift für Kritische Sozialtheorie Und Philosophie 5 (2):264-281.
    The contemporary agonist thinker, Chantal Mouffe argues that conflicts are constitutive of politics. However, this position raises the question that concerns the survival of order and the proper types of conflicts in democracies. Although Mouffe is not consensus-oriented, consensus plays a role in her theory when the democratic order is at stake. This suggests that there is a theoretical terrain between the opposing poles of conflict and consensus. This can be discussed with the help of concepts and theories (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Specter of Normative Conflict: Does Fairness Require Inaccuracy?Rima Basu - 2020 - In Erin Beeghly & Alex Madva (eds.), An Introduction to Implicit Bias: Knowledge, Justice, and the Social Mind. New York, NY, USA: Routledge. pp. 191-210.
    A challenge we face in a world that has been shaped by, and continues to be shaped by, racist attitudes and institutions is that the evidence is often stacked in favor of racist beliefs. As a result, we may find ourselves facing the following conflict: what if the evidence we have supports something we morally shouldn’t believe? For example, it is morally wrong to assume, solely on the basis of someone’s skin color, that they’re a staff member. But, what if (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  50.  37
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 966