Journal articles on the topic 'Cyber Attribution'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber Attribution.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Swate, Clementine, Siphesihle Sithungu, and Khutso Lebea. "An Analysis of Cyberwarfare Attribution Techniques and Challenges." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 552–59. http://dx.doi.org/10.34190/eccws.23.1.2190.
Full textEichensehr, Kristen E. "Decentralized Cyberattack Attribution." AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Full textKeitner, Chimène I. "Attribution by Indictment." AJIL Unbound 113 (2019): 207–12. http://dx.doi.org/10.1017/aju.2019.34.
Full textBanks, William C. "The Bumpy Road to a Meaningful International Law of Cyber Attribution." AJIL Unbound 113 (2019): 191–96. http://dx.doi.org/10.1017/aju.2019.32.
Full textKotenko, Igor, and Semyon Khmyrov. "Analysis of Models and Techniques Used for Attribution of Cyber Security Violators in the Implementation of Targeted Attacks." Voprosy kiberbezopasnosti, no. 4(50) (2022): 52–79. http://dx.doi.org/10.21681/2311-3456-2022-4-52-79.
Full textVostoupal, Jakub, and Kateřina Uhlířová. "Of Hackers and Privateers: The Possible Evolution of the Problem of Cyber-Attribution." Masaryk University Journal of Law and Technology 18, no. 2 (2024): 169–214. http://dx.doi.org/10.5817/mujlt2024-2-2.
Full textKpieleh, Ferdinand. "A Review of Attacker Attribution." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 197–202. http://dx.doi.org/10.22624/aims/crp-bk3-p32.
Full textDavituliani, Salome. "THE NEXUS OF DISINFORMATION, ATTRIBUTION, AND ESCALATION: UNRAVELING THE COMPLEXITIES OF CYBER OPERATIONS AND WARFARE." თავდაცვა და მეცნიერება 3 (December 24, 2024): 57–63. https://doi.org/10.61446/ds.3.2024.8473.
Full textGoel, Sanjay. "How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race." Connections: The Quarterly Journal 19, no. 1 (2020): 87–95. http://dx.doi.org/10.11610/connections.19.1.08.
Full textDr., Divakar Sharma. "The Evolving Cyber Threats in International Forum." International Journal of Contemporary Research in Multidisciplinary 3, no. 5 (2024): 219–23. https://doi.org/10.5281/zenodo.14007842.
Full textSabir, Muhammad Imtiaz. "Assessing Attribution and Credible Deterrence in Cyberspace." BTTN Journal 3, no. 1 (2024): 132–47. http://dx.doi.org/10.61732/bj.v3i1.87.
Full textBerghel, Hal. "On the Problem of (Cyber) Attribution." Computer 50, no. 3 (2017): 84–89. http://dx.doi.org/10.1109/mc.2017.74.
Full textDr.Ranjith and Mr.Praveen. "Enhancing IoT-Enabled Cyber-Physical Systems with Cyber-AttackDetection and Attribution." Journal of Engineering Sciences 15, no. 11 (2024): 518–26. https://doi.org/10.36893/jes.2024.v15i11.056.
Full textXiang, Xiayu, Hao Liu, Liyi Zeng, Huan Zhang, and Zhaoquan Gu. "IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data." Mathematics 12, no. 9 (2024): 1364. http://dx.doi.org/10.3390/math12091364.
Full textΚόκκινος, Κωνσταντίνος, Ναυσικά Αντωνιάδου та Ιωάννα Βουλγαρίδου. "Ο Μεσολαβητικός Ρόλος της Εχθρικής Απόδοσης Αιτιότητας στη Σχέση της Προσωπικότητας με τον Κυβερνο-Εκφοβισμό". Psychology: the Journal of the Hellenic Psychological Society 24, № 1 (2020): 93. http://dx.doi.org/10.12681/psy_hps.22388.
Full textSpáčil, Jakub. "Attribution of Cyber Operations: Technical, Legal and Political Perspectives." International and Comparative Law Review 24, no. 2 (2024): 150–68. https://doi.org/10.2478/iclr-2024-0022.
Full textHakimi, Monica. "Introduction to the Symposium on Cyber Attribution." AJIL Unbound 113 (2019): 189–90. http://dx.doi.org/10.1017/aju.2019.30.
Full textFinlay, Lorraine, and Christian Payne. "The Attribution Problem and Cyber Armed Attacks." AJIL Unbound 113 (2019): 202–6. http://dx.doi.org/10.1017/aju.2019.35.
Full textKumar, Rajesh. "The Problem of Attribution in Cyber Security." International Journal of Computer Applications 131, no. 7 (2015): 34–36. http://dx.doi.org/10.5120/ijca2015907386.
Full textRuohonen, Sami, Alexey Kirichenko, Dmitriy Komashinskiy, and Mariam Pogosova. "Instrumenting OpenCTI with a Capability for Attack Attribution Support." Forensic Sciences 4, no. 1 (2024): 12–23. http://dx.doi.org/10.3390/forensicsci4010002.
Full textKim, Kyoungmin, Youngsup Shin, Justin Lee, and Kyungho Lee. "Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator." Sensors 21, no. 19 (2021): 6522. http://dx.doi.org/10.3390/s21196522.
Full textHettema, Hinne. "Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence." Computers & Security 109 (October 2021): 102396. http://dx.doi.org/10.1016/j.cose.2021.102396.
Full textBalaji, Snikdha, and Vedam Anand Kumar. "Cyber Warfare and Attribution: Exploring the Regulatory Role of International Law." International Journal of Science and Research (IJSR) 12, no. 12 (2023): 372–75. http://dx.doi.org/10.21275/sr231204073934.
Full textMazaraki, Nataliia, and Yulia Goncharova. "CYBER DIMENSION OF HYBRID WARS: ESCAPING A ‘GREY ZONE’ OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES." Baltic Journal of Economic Studies 8, no. 2 (2022): 115–20. http://dx.doi.org/10.30525/2256-0742/2022-8-2-115-120.
Full textBlagden, David. "Deterring Cyber Coercion: The Exaggerated Problem of Attribution." Survival 62, no. 1 (2020): 131–48. http://dx.doi.org/10.1080/00396338.2020.1715072.
Full textLee, Min-ho, Chang-wook Park, Wan-ju Kim, and Jae-sung Lim. "CAAM - Model for National-level Cyber Attack Attribution." Journal of KIISE 47, no. 1 (2020): 19–26. http://dx.doi.org/10.5626/jok.2020.47.1.19.
Full textCook, Allan, Andrew Nicholson, Helge Janicke, Leandros Maglaras, and Richard Smith. "Attribution of Cyber Attacks on Industrial Control Systems." EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 3, no. 7 (2016): 151158. http://dx.doi.org/10.4108/eai.21-4-2016.151158.
Full textGrotto, Andrew. "Deconstructing Cyber Attribution: A Proposed Framework and Lexicon." IEEE Security & Privacy 18, no. 1 (2020): 12–20. http://dx.doi.org/10.1109/msec.2019.2938134.
Full textSchulzke, Marcus. "The Politics of Attributing Blame for Cyberattacks and the Costs of Uncertainty." Perspectives on Politics 16, no. 4 (2018): 954–68. http://dx.doi.org/10.1017/s153759271800110x.
Full textJahromi, Amir Namavar, Hadis Karimipour, Ali Dehghantanha, and Kim-Kwang Raymond Choo. "Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems." IEEE Internet of Things Journal 8, no. 17 (2021): 13712–22. http://dx.doi.org/10.1109/jiot.2021.3067667.
Full textPoli, Sara, and Emanuele Sommario. "The Rationale and the Perils of Failing to Invoke State Responsibility for Cyber-Attacks: The Case of the EU Cyber Sanctions." German Law Journal 24, no. 3 (2023): 522–36. http://dx.doi.org/10.1017/glj.2023.25.
Full textSS, Latha, K. Mani Sai Goud, P. Muni Sai Chetan Reddy, P. Surendra Reddy, and P. Bharath Arun. "Cyber-Attacks in IoT-enabled Cyber-physical Systems." ITM Web of Conferences 56 (2023): 06003. http://dx.doi.org/10.1051/itmconf/20235606003.
Full textShaffer, Alan, Dwain Hembree, and Gurminder Singh. "Obfuscation, Stealth, and Non-Attribution in Automated Red Team Tools." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 132–41. https://doi.org/10.34190/iccws.20.1.3290.
Full textPipyros, Kosmas, Lilian Mitrou, Dimitris Gritzalis, and Theodoros Apostolopoulos. "Cyberoperations and international humanitarian law." Information & Computer Security 24, no. 1 (2016): 38–52. http://dx.doi.org/10.1108/ics-12-2014-0081.
Full textEdwards, Benjamin, Alexander Furnas, Stephanie Forrest, and Robert Axelrod. "Strategic aspects of cyberattack, attribution, and blame." Proceedings of the National Academy of Sciences 114, no. 11 (2017): 2825–30. http://dx.doi.org/10.1073/pnas.1700442114.
Full textBoutin, Berenice. "Shared Responsibility for Cyber Operations." AJIL Unbound 113 (2019): 197–201. http://dx.doi.org/10.1017/aju.2019.31.
Full textM Salem Abu Alead, Rafeak, and ALI AMHMED AB ALTALIBE. "Attribution Challenges in the Era of Cyber Warfare: Unraveling the Identity of Cyber-Attackers." مجلة المعهد العالي للدراسات النوعية 3, no. 16 (2023): 5287–309. http://dx.doi.org/10.21608/hiss.2023.337323.
Full textSharma, Munish. "Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks." Strategic Analysis 45, no. 1 (2021): 18–37. http://dx.doi.org/10.1080/09700161.2020.1870268.
Full textVostoupal, Jakub. "Stuxnet vs WannaCry and Albania: Cyber-attribution on trial." Computer Law & Security Review 54 (September 2024): 106008. http://dx.doi.org/10.1016/j.clsr.2024.106008.
Full textTsagourias, N. "Cyber attacks, self-defence and the problem of attribution." Journal of Conflict and Security Law 17, no. 2 (2012): 229–44. http://dx.doi.org/10.1093/jcsl/krs019.
Full textDevanny, Joe, Luiz Goldoni, and Breno Medeiros. "Strategy in an Uncertain Domain: Threat and Response in Cyberspace." Journal of Strategic Security 15, no. 2 (2022): 34–47. http://dx.doi.org/10.5038/1944-0472.15.2.1954.
Full textShahid, Nida, and Ahmad Khan. "ADDRESSING CYBER VULNERABILITIES THROUGH DETERRENCE." Journal of Contemporary Studies 11, no. 1 (2022): 50–68. http://dx.doi.org/10.54690/jcs.v11i1.212.
Full textГоэль, Санджай. "Как улучшенная атрибуция в кибер войне может способствовать деэскалации гонки кибер вооружений". Connections: The Quarterly Journal 19, № 1 (2020): 101–11. http://dx.doi.org/10.11610/connections.rus.19.1.08.
Full textMikanagi, Tomohiro, and Kubo Mačák. "Attribution of cyber operations: an international law perspective on the Park Jin Hyok case." Cambridge International Law Journal 9, no. 1 (2020): 51–75. http://dx.doi.org/10.4337/cilj.2020.01.03.
Full textDevica, Gracella Shenie, Jesselena Arinda Putri, Maria Jessica Kunardi, Regyta Starlameivia Tanujaya, and M. M. Tri Warmiyati Dwi W. "ANALISIS ASPEK VICTIM ATTRIBUTION PADA REINFORCER BYSTANDER DALAM CYBER BULLYING KALANGAN GENERASI Z." MANASA 13, no. 2 (2024): 114–33. https://doi.org/10.25170/manasa.v13i2.6090.
Full textSurilova, O. O. "PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES." Constitutional State, no. 43 (October 26, 2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.
Full textGoel, Sanjay, and Brian Nussbaum. "Attribution Across Cyber Attack Types: Network Intrusions and Information Operations." IEEE Open Journal of the Communications Society 2 (2021): 1082–93. http://dx.doi.org/10.1109/ojcoms.2021.3074591.
Full textMaglaras, Leandros, Mohamed Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, and Stylianos Rallis. "Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures." ICST Transactions on Security and Safety 5, no. 16 (2018): 155856. http://dx.doi.org/10.4108/eai.15-10-2018.155856.
Full textNeely, Jr., Phillip R., and Michelle T. Allen. "Policing Cyber Terrorism." Journal of Cybersecurity Research (JCR) 3, no. 1 (2018): 13–18. http://dx.doi.org/10.19030/jcr.v3i1.10227.
Full textKreps, Sarah, and Debak Das. "Warring from the virtual to the real: Assessing the public’s threshold for war over cyber security." Research & Politics 4, no. 2 (2017): 205316801771593. http://dx.doi.org/10.1177/2053168017715930.
Full text