نتایج جستجو برای: counter intelligence
تعداد نتایج: 147504 فیلتر نتایج به سال:
We present a model of surveillance based on the detection of community structure in social networks. We examine the extent of network topology information an adversary is required to gather in order to obtain high quality intelligence about community membership. We show that selective surveillance strategies can improve the adversary’s resource efficiency. However, the use of counter-surveillan...
abstract the current research tried to examine the impact of multiple intelligence (mi) and its components on multiple choice (mc) and open ended (oe) reading comprehension tests. ninety six students of high school in grade four took part in this study. to collect data, participants completed multiple intelligence (mi) questionnaires along with a multiple choice (mc) and open ended (oe) forms ...
We present a model of surveillance based on the detection of community structure in social networks. We examine the extent of network topology information an adversary is required to gather in order to obtain high quality intelligence about community membership. We show that selective surveillance strategies can improve the adversary’s resource efficiency. However, the use of counter-surveillan...
Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide decision makers with the right information at the right time. Data quality varies from very high quality data generated by reputable sources to misleading and very low quality data generated by malicious entities. Dispa...
The Machiavellian/Social Intelligence Hypothesis proposes that a complex social environment selected for advanced cognitive abilities in vertebrates. In primates it has been proposed that sophisticated social strategies like obtaining suitable coalition partners are an important component of social intelligence. Knowing the rank relationships between group members is a basic requirement for the...
Jeff Moss took the audience on a behind-the-scenes look at cybersecurity policy and practice, starting from the origins of DEFCON, and continuing on to present day Washington, DC policy-making as ICANN’s chief security officer. Two decades ago, when the first DEFCON was taking shape, part of the goal was to get as many computer security-focused individuals in one place in order to encourage the...
This article examined the elements that contributed to ASEAN counter-terrorism cooperation's failure prevent presence of Foreign Terrorist Fighters (FTF) in Marawi conflict 2017. The massive ISIS propaganda resulted an increase FTF mobilization from several countries unite Abu Sayyaf and Maute groups taking control City. study used a qualitative method deductive analysis technique by compiling ...
This goal of this paper is to defend the plausibility of the argument that passing the Turing test is a sufficient condition for the presence of intelligence. To this effect, we put forth new objections to two famous counter-arguments: Searle’s ”Chinese Room” and Block’s ”Aunt Bertha.” We take Searle’s argument to consist of two points: 1) intelligence is not merely an ability to manipulate for...
today, such organizations are successful and can continue to grow and survive in the competitive conditions that try to make use of thoughts and new ideas and identify needs and environmental opportunities and exploit to their benefit the actions that other organizations are doing in order to gain a competitive advantage and thereby, they can prevent the possible threats that will arise in the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید