Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „State cyberattacks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "State cyberattacks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "State cyberattacks"
Watney, Murdoch. „Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective“. European Conference on Cyber Warfare and Security 21, Nr. 1 (08.06.2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Der volle Inhalt der QuelleNizovtsev, Yuriy Yu, Andrii M. Lyseiuk und Mykhailo Kelman. „From self-affirmation to national security threat“. Revista Científica General José María Córdova 20, Nr. 38 (01.04.2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Der volle Inhalt der QuelleAnnef, Al Bahits. „ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA“. Sriwijaya Journal of International Relations 1, Nr. 1 (28.06.2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Der volle Inhalt der QuelleKOLOSOK, Irina N., und Liudmila A. GURINA. „Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods“. Elektrichestvo 6, Nr. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Der volle Inhalt der QuelleKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng und Brian L. Smith. „Investigating Cybersecurity Issues in Active Traffic Management Systems“. Transportation Research Record: Journal of the Transportation Research Board 2672, Nr. 19 (22.07.2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Der volle Inhalt der QuelleGórka, Marek. „Catalysts of Cyber Threats on the Example of Visegrad Group Countries“. Politics in Central Europe 18, Nr. 3 (01.09.2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Der volle Inhalt der QuellePołeć, Jolanta, und Wojciech Trzaskowski. „The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe“. Przegląd Nauk o Obronności, Nr. 12 (20.06.2022): 111–30. http://dx.doi.org/10.37055/pno/150838.
Der volle Inhalt der QuelleHrushko, M. V. „ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE“. Constitutional State, Nr. 43 (26.10.2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.
Der volle Inhalt der QuelleAlsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani und Raed Alsini. „Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model“. Symmetry 14, Nr. 7 (15.07.2022): 1450. http://dx.doi.org/10.3390/sym14071450.
Der volle Inhalt der QuelleEichensehr, Kristen E. „Decentralized Cyberattack Attribution“. AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Der volle Inhalt der QuelleDissertationen zum Thema "State cyberattacks"
Morrison, Glenn Sean. „Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging“. Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1535490827978036.
Der volle Inhalt der QuelleDi, Maggio Antonia. „Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe“. Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Der volle Inhalt der QuelleComputer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression
Bücher zum Thema "State cyberattacks"
1940-, Owens William A., Dam Kenneth W, Lin Herbert, National Research Council (U.S.). Committee on Offensive Information Warfare., National Research Council (U.S.). Computer Science and Telecommunications Board. und National Research Council (U.S.). Division on Engineering and Physical Sciences., Hrsg. Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Washington, DC: National Academies Press, 2009.
Den vollen Inhalt der Quelle findenBittner, Marc-Philipp, Anabel Guntermann, Christoph Benedikt Müller und Darius Rostam, Hrsg. Cybersecurity als Unternehmensleitungsaufgabe. Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748927679.
Der volle Inhalt der QuelleFreilich, Charles D. The Changing Military Threat. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0004.
Der volle Inhalt der QuelleKoppel, Ted. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Random House Audio, 2015.
Den vollen Inhalt der Quelle findenLights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Broadway Books, 2016.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "State cyberattacks"
Shahin, Mohammad, FFrank Chen, Hamed Bouzary, Ali Hosseinzadeh und Rasoul Rashidifar. „Implementation of a Novel Fully Convolutional Network Approach to Detect and Classify Cyber-Attacks on IoT Devices in Smart Manufacturing Systems“. In Lecture Notes in Mechanical Engineering, 107–14. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18326-3_11.
Der volle Inhalt der QuelleFritsch, Lothar, Aws Jaber und Anis Yazidi. „An Overview of Artificial Intelligence Used in Malware“. In Communications in Computer and Information Science, 41–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Der volle Inhalt der QuelleMiadzvetskaya, Yuliya. „Between Strategic Autonomy and International Norm-setting“. In Global Studies, 261–86. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.
Der volle Inhalt der QuelleChacko, Ashwathy Anda, Bijolin Edwin und M. Roshni Thanka. „Detecting the Lateral Movement in Cyberattack at the Early Stage Using Machine Learning Techniques“. In Lecture Notes in Electrical Engineering, 581–88. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2177-3_54.
Der volle Inhalt der QuelleSicard, Franck, Éric Zamai und Jean-Marie Flaus. „Critical States Distance Filter Based Approach for Detection and Blockage of Cyberattacks in Industrial Control Systems“. In Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems, 117–45. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4_5.
Der volle Inhalt der QuelleVan De Velde, Jacqueline. „The Dangers of Forceful Countermeasures as a Response to Cyber Election Interference“. In Defending Democracies, 215–38. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197556979.003.0011.
Der volle Inhalt der QuelleBoyte, Kenneth J. „A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine“. In National Security, 108–25. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7912-0.ch007.
Der volle Inhalt der QuelleBoyte, Kenneth J. „A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine“. In Cyber Warfare and Terrorism, 1214–31. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch071.
Der volle Inhalt der QuelleForst, Brian. „Managing Fear in a Post-Factual Era“. In NATO Science for Peace and Security Series – E: Human and Societal Dynamics. IOS Press, 2021. http://dx.doi.org/10.3233/nhsdp200086.
Der volle Inhalt der QuelleManess, Ryan C., Rebecca Lorentz und Brandon Valeriano. „16. Cyber Conflict in the Age of Great Power Competition“. In Strategy in the Contemporary World, 277–96. Oxford University Press, 2022. http://dx.doi.org/10.1093/hepl/9780192845719.003.0016.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "State cyberattacks"
Khan, Shiraz, Inseok Hwang und James Goppert. „Robust State Estimation in the Presence of Stealthy Cyberattacks“. In 2022 American Control Conference (ACC). IEEE, 2022. http://dx.doi.org/10.23919/acc53348.2022.9867774.
Der volle Inhalt der QuelleSaraswat, Govind, Rui Yang, Yajing Liu und Yingchen Zhang. „Analyzing the effects of cyberattacks on distribution system state estimation“. In 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2021. http://dx.doi.org/10.1109/isgt49243.2021.9372262.
Der volle Inhalt der QuelleKotsiuba, Igor. „Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI“. In Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks. Promote Ukraine, 2019. http://dx.doi.org/10.34054/bdc004.
Der volle Inhalt der QuelleSun, Yizhou, und Ya Zhang. „Adaptive tracking control of unknown state target for CPSs subjected to cyberattacks“. In 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2022. http://dx.doi.org/10.1109/icarcv57592.2022.10004235.
Der volle Inhalt der QuelleMuzyka, Viktoriia. „ATTRIBUTION OF CYBERATTACKS COMMITTED THROUGH CYBERINFRASTRUCTURE OF A THIRD STATE AND DUE DILIGENCE OBLIGATION“. In Relevant Trends of Scientific Research in the Countries of Central and Eastern Europe. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-002-5-32.
Der volle Inhalt der QuellePatterson, Wayne, und Jeremy Blacksttone. „A Metric to Assist in Detecting International Phishing or Ransomware Cyberattacks“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002195.
Der volle Inhalt der QuelleParfenov, Denis, Lubov Zabrodina, Arthur Zhigalov, Vadim Torchin und Anton Parfenov. „Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes“. In 2019 International Conference on Engineering and Telecommunication (EnT). IEEE, 2019. http://dx.doi.org/10.1109/ent47717.2019.9030558.
Der volle Inhalt der QuelleBurguin, Yvan, David Espes, Philippe Rauffet, Christine Chauvin und Philippe Le Parc. „Cyberdefense Adaptive Training Based on the Classification of Operator Cognitive State“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002202.
Der volle Inhalt der QuelleQian, Yiyue, Yiming Zhang, Yanfang Ye und Chuxu Zhang. „Adapting Meta Knowledge with Heterogeneous Information Network for COVID-19 Themed Malicious Repository Detection“. In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/507.
Der volle Inhalt der QuelleUdroiu, Adriana meda. „THE CYBERSECURITY OF ELEARNING PLATFORMS“. In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-229.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "State cyberattacks"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), Februar 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Der volle Inhalt der QuelleAnthony, Ian, Fei Su und Lora Saalman. Naval Incident Management in Europe, East Asia and South East Asia. Stockholm International Peace Research Institute, März 2023. http://dx.doi.org/10.55163/zzbg6990.
Der volle Inhalt der Quelle