Zeitschriftenartikel zum Thema „State cyberattacks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "State cyberattacks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Watney, Murdoch. „Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective“. European Conference on Cyber Warfare and Security 21, Nr. 1 (08.06.2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Der volle Inhalt der QuelleNizovtsev, Yuriy Yu, Andrii M. Lyseiuk und Mykhailo Kelman. „From self-affirmation to national security threat“. Revista Científica General José María Córdova 20, Nr. 38 (01.04.2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Der volle Inhalt der QuelleAnnef, Al Bahits. „ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA“. Sriwijaya Journal of International Relations 1, Nr. 1 (28.06.2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Der volle Inhalt der QuelleKOLOSOK, Irina N., und Liudmila A. GURINA. „Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods“. Elektrichestvo 6, Nr. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Der volle Inhalt der QuelleKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng und Brian L. Smith. „Investigating Cybersecurity Issues in Active Traffic Management Systems“. Transportation Research Record: Journal of the Transportation Research Board 2672, Nr. 19 (22.07.2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Der volle Inhalt der QuelleGórka, Marek. „Catalysts of Cyber Threats on the Example of Visegrad Group Countries“. Politics in Central Europe 18, Nr. 3 (01.09.2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Der volle Inhalt der QuellePołeć, Jolanta, und Wojciech Trzaskowski. „The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe“. Przegląd Nauk o Obronności, Nr. 12 (20.06.2022): 111–30. http://dx.doi.org/10.37055/pno/150838.
Der volle Inhalt der QuelleHrushko, M. V. „ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE“. Constitutional State, Nr. 43 (26.10.2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.
Der volle Inhalt der QuelleAlsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani und Raed Alsini. „Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model“. Symmetry 14, Nr. 7 (15.07.2022): 1450. http://dx.doi.org/10.3390/sym14071450.
Der volle Inhalt der QuelleEichensehr, Kristen E. „Decentralized Cyberattack Attribution“. AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Der volle Inhalt der QuelleKnebel, Sebastian, Mario D. Schultz und Peter Seele. „Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating“. Journal of Information, Communication and Ethics in Society 20, Nr. 1 (11.10.2021): 91–109. http://dx.doi.org/10.1108/jices-01-2021-0015.
Der volle Inhalt der QuelleVasylenko, Serhii, Igor Samoilov und Serhii Burian. „Method of control of the state of protection of the automated process control system of the critical infrastructure facility“. Collection "Information Technology and Security" 10, Nr. 1 (30.06.2022): 17–26. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261047.
Der volle Inhalt der QuelleKolosok, Irina, und Liudmila Gurina. „Cyber Security-Oriented Smart Grid State Estimation“. E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Der volle Inhalt der QuelleSurilova, O. O. „PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES“. Constitutional State, Nr. 43 (26.10.2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.
Der volle Inhalt der QuelleVoronko, I. „DIFFERENTIAL-GAME MODEL OF INFORMATION PROTECTION FOR COMPUTER SYSTEMS OF TRANSPORT INFRASTRUCTURE“. Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, Nr. 38 (24.12.2021): 201–12. http://dx.doi.org/10.32703/2617-9040-2021-38-198-19.
Der volle Inhalt der QuellePoptchev, Peter. „NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages“. Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.
Der volle Inhalt der QuelleKolosok, Irina, und Liudmila Gurina. „A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis“. E3S Web of Conferences 216 (2020): 01029. http://dx.doi.org/10.1051/e3sconf/202021601029.
Der volle Inhalt der QuelleLYSENKO, SERGII, DMYTRO SOKALSKYI und IIANA MYKHASKO. „METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART“. Computer systems and information technologies, Nr. 3 (14.04.2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.
Der volle Inhalt der QuelleLukicheva, I. A., und A. L. Kulikov. „The usage of power system multi-model forecasting aided state estimation for cyber attack detection“. Power engineering: research, equipment, technology 23, Nr. 5 (09.01.2022): 13–23. http://dx.doi.org/10.30724/1998-9903-2021-23-5-13-23.
Der volle Inhalt der QuelleKallberg, Jan, und Bhavani Thuraisingham. „State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks“. IT Professional 15, Nr. 3 (Mai 2013): 32–35. http://dx.doi.org/10.1109/mitp.2013.20.
Der volle Inhalt der QuelleMaltseva, Irina, Yuliya Chernish und Roman Shtonda. „ANALYSIS OF SOME CYBER THREATS IN WAR“. Cybersecurity: Education, Science, Technique 16, Nr. 4 (2022): 37–44. http://dx.doi.org/10.28925/2663-4023.2022.16.3744.
Der volle Inhalt der QuelleSigholm, Johan. „Non-State Actors in Cyberspace Operations“. Journal of Military Studies 4, Nr. 1 (01.12.2013): 1–37. http://dx.doi.org/10.1515/jms-2016-0184.
Der volle Inhalt der QuelleMokhor, Volodymyr, Oleksandr Korchenko, Serhii Honchar, Maxsim Komarov und Alla Onyskova. „Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects“. E3S Web of Conferences 280 (2021): 09009. http://dx.doi.org/10.1051/e3sconf/202128009009.
Der volle Inhalt der QuelleТарасевич, Ксения Александровна. „Cyberattack as a Risk Factor During Formation of Business Reputation of a Commercial Legal Entity“. ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, Nr. 2 (15.06.2022): 87–92. http://dx.doi.org/10.26163/gief.2022.68.56.015.
Der volle Inhalt der QuelleVega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, José-Luis Casteleiro-Roca, Esteban Jove, María del Carmen Meizoso-López, Benigno Antonio Rodríguez-Gómez et al. „Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids“. Applied Sciences 10, Nr. 7 (27.03.2020): 2276. http://dx.doi.org/10.3390/app10072276.
Der volle Inhalt der QuelleActon, James M. „Cyber Warfare & Inadvertent Escalation“. Daedalus 149, Nr. 2 (April 2020): 133–49. http://dx.doi.org/10.1162/daed_a_01794.
Der volle Inhalt der QuelleGonzález-Manzano, Lorena, José M. de Fuentes, Cristina Ramos, Ángel Sánchez und Florabel Quispe. „Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model“. Security and Communication Networks 2022 (29.06.2022): 1–11. http://dx.doi.org/10.1155/2022/5784674.
Der volle Inhalt der QuelleSoleymannejad, Mohammad, Danial Sadrian Zadeh, Behzad Moshiri, Ebrahim Navid Sadjadi, Jesús García Herrero und Jose Manuel Molina López. „State Estimation Fusion for Linear Microgrids over an Unreliable Network“. Energies 15, Nr. 6 (21.03.2022): 2288. http://dx.doi.org/10.3390/en15062288.
Der volle Inhalt der QuellePérez-Morón, James. „Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda“. Journal of Asia Business Studies 16, Nr. 2 (03.11.2021): 371–95. http://dx.doi.org/10.1108/jabs-11-2020-0444.
Der volle Inhalt der QuelleNikolaienko, Bohdan, und Serhii Vasylenko. „APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES“. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, Nr. 4 (20.12.2021): 9–13. http://dx.doi.org/10.35784/iapgos.2822.
Der volle Inhalt der QuelleLobach, Dmitriy. „TO THE QUESTION OF POSSIBLE INTERNATIONAL LEGAL QUALIFICATION OF CYBER ATTACKS AS A CRIME OF AGGRESSION AND INTERNATIONAL TERRORISM“. Advances in Law Studies 9, Nr. 4 (25.12.2021): 46–50. http://dx.doi.org/10.29039/2409-5087-2021-9-4-46-50.
Der volle Inhalt der QuelleToliupa, S., S. Buchyk, O. Buchyk und O. Kulinich. „PROTECTION OF STATE MANAGEMENT OF CRITICAL INFRASTRUCTURE OBJECTS UNDER THE INFLUENCE OF CYBER ATTACKS“. Information and communication technologies, electronic engineering 2, Nr. 2 (Dezember 2022): 33–41. http://dx.doi.org/10.23939/ictee2022.02.033.
Der volle Inhalt der QuelleAbuali, M. M., und M. Sh Junisbekov. „Current cybersecurity state of automated processes in the international Aktau seaport“. Mechanics and Technologies, Nr. 3 (30.09.2021): 58–62. http://dx.doi.org/10.55956/giwk9768.
Der volle Inhalt der QuelleShin, Young, Jae Lee und Myungchul Kim. „Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles“. Journal of the Association for Information Systems 19, Nr. 3 (März 2018): 152–81. http://dx.doi.org/10.17705/1jais.00488.
Der volle Inhalt der QuelleBoyte, Kenneth J. „A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine: Exemplifying the Evolution of Internet-Supported Warfare“. International Journal of Cyber Warfare and Terrorism 7, Nr. 2 (April 2017): 54–69. http://dx.doi.org/10.4018/ijcwt.2017040104.
Der volle Inhalt der QuelleLavrova, D. S. „Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks“. Automatic Control and Computer Sciences 53, Nr. 8 (Dezember 2019): 1023–25. http://dx.doi.org/10.3103/s0146411619080133.
Der volle Inhalt der QuelleShterev, Yordan. „Concepts of Cyber Security“. Innovative STEM Education 4, Nr. 1 (10.06.2022): 79–88. http://dx.doi.org/10.55630/stem.2022.0411.
Der volle Inhalt der QuelleDeng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang und Yunfei Su. „A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities“. Scientific Programming 2020 (27.09.2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Der volle Inhalt der QuelleEfrony, Dan, und Yuval Shany. „A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice“. American Journal of International Law 112, Nr. 4 (Oktober 2018): 583–657. http://dx.doi.org/10.1017/ajil.2018.86.
Der volle Inhalt der QuelleZhou, Buxiang, Yating Cai, Tianlei Zang, Jiale Wu, Binjie Sun und Shi Chen. „Reliability Assessment of Cyber–Physical Distribution Systems Considering Cyber Disturbances“. Applied Sciences 13, Nr. 6 (08.03.2023): 3452. http://dx.doi.org/10.3390/app13063452.
Der volle Inhalt der QuelleRiebe, Thea, Marc-André Kaufhold und Christian Reuter. „The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study“. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (13.10.2021): 1–30. http://dx.doi.org/10.1145/3479865.
Der volle Inhalt der QuelleSutikno, Tole, und Deris Stiawan. „Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector?“ Bulletin of Electrical Engineering and Informatics 11, Nr. 6 (01.12.2022): 2989–94. http://dx.doi.org/10.11591/eei.v11i6.4854.
Der volle Inhalt der QuelleKalinin, Maxim, Dmitry Zegzhda, Vasiliy Krundyshev, Daria Lavrova, Dmitry Moskvin und Evgeny Pavlenko. „Application of Bioinformatics Algorithms for 3RO\PRUSKLF Cyberattacks Detection“. Informatics and Automation 20, Nr. 4 (03.08.2021): 820–44. http://dx.doi.org/10.15622/ia.20.4.3.
Der volle Inhalt der QuelleHallman, Roger A., Maxine Major, Jose Romero-Mariona, Richard Phipps, Esperanza Romero, Scott M. Slayback, Francisco Tacliad und John M. San Miguel. „Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures“. International Journal of Organizational and Collective Intelligence 11, Nr. 2 (April 2021): 91–112. http://dx.doi.org/10.4018/ijoci.2021040105.
Der volle Inhalt der QuelleTANRIVERDIYEV, Elshan. „THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES“. National Security Studies 23, Nr. 1 (30.03.2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.
Der volle Inhalt der QuelleMarkov, A., und N. Romashkina. „The Problem of Identifying the Source (Atribution) of Cyberattacks – An International Security Factor“. World Economy and International Relations 66, Nr. 12 (2022): 58–68. http://dx.doi.org/10.20542/0131-2227-2022-66-12-58-68.
Der volle Inhalt der QuelleHumeniuk, I. V., M. S. Basaraba und O. V. Nekrilov. „METHODS OF ENSURING CYBER SECURITY OF CRITICAL COMPONENTSNETWORKS OF INFORMATION AND TELECOMMUNICATION SYSTEM“. Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, Nr. 18 (30.12.2020): 101–10. http://dx.doi.org/10.46972/2076-1546.2020.18.10.
Der volle Inhalt der QuelleKyva, Vladyslav. „ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION“. Cybersecurity: Education, Science, Technique 3, Nr. 15 (2022): 53–70. http://dx.doi.org/10.28925/2663-4023.2022.15.5370.
Der volle Inhalt der QuelleAhmed, Mohiuddin, David Cox, Benjamin Simpson und Aseel Aloufi. „ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things“. Applied Sciences 12, Nr. 4 (14.02.2022): 1990. http://dx.doi.org/10.3390/app12041990.
Der volle Inhalt der QuelleDiorditsa, Igor. „Modern legal content of optimization of directions of administrative and legal regulation of the state cybersecurity policy“. Slovo of the National School of Judges of Ukraine, Nr. 4(33) (15.03.2021): 31–42. http://dx.doi.org/10.37566/2707-6849-2020-4(33)-3.
Der volle Inhalt der Quelle