About 300,000 results
Open links in new tab
  1. This white paper highlights a number of the destructive malware families analyzed by the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and gives …

  2. Section 5845(f)(3) excludes from the term “destructive device” any device which is neither designed or redesigned for use as a weapon and any device, although originally designed for …

  3. In principle, a pair of counterpropagating waves (with separate sources) whose waveforms are the negative of each other can completely cancel at some moment in time. Does this destructive …

  4. estructive malware incidents. In this report, the team draws on forensic investigations of destructive malware attacks to deliver valuable insight into.

  5. We assume that destructive behavior usually happens when people have become fused with all sorts of beliefs, ideas, attitudes, assumptions, convictions, and judgments, and that this fusion …

  6. The paper examines various types of destructive AI, such as weaponized AI, autonomous weapons, and autonomous systems designed to engage in destructive behaviours.

  7. Thus, the person must know or be aware that he/she possessed the item, here, a destructive device. Defendant’s possession cannot merely be a passing control that is fleeting or uncertain …