2022
DOI: 10.1109/tts.2022.3202323
|View full text |Cite
|
Sign up to set email alerts
|

Emerging Technologies, Evolving Threats: Next-Generation Security Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Flexibility in resource allocation is crucial to adapt to changing circumstances and emerging needs during peacekeeping missions. The dynamic nature of conflict zones requires the ability to reallocate resources based on evolving security threats, shifting priorities, and emerging challenges (Bonaci, Michael, & Rivas, 2022). Decision-makers should have mechanisms in place to monitor and assess resource utilization and make timely adjustments when necessary.…”
Section: Resource Allocationmentioning
confidence: 99%
“…Flexibility in resource allocation is crucial to adapt to changing circumstances and emerging needs during peacekeeping missions. The dynamic nature of conflict zones requires the ability to reallocate resources based on evolving security threats, shifting priorities, and emerging challenges (Bonaci, Michael, & Rivas, 2022). Decision-makers should have mechanisms in place to monitor and assess resource utilization and make timely adjustments when necessary.…”
Section: Resource Allocationmentioning
confidence: 99%
“…While this strategy has continued to strengthen organizational and infrastructural defenses, we must consider the new emergent threats. These include homogeneity in products at their core operating system, large storage area network providers and critical telecommunication exchanges and international banking interchanges, and the supply of electricity and water, in addition to the respective interdependencies [11], [12]. Of particular importance are autonomous systems leveraging advanced machine learning systems that incorporate blackbox models (e.g., billion parameter neural networks), and highly complex technologies that may be microscopic and even embeddable and undetectable [13].…”
Section: Setting the Scenementioning
confidence: 99%