Academic literature on the topic 'Cyber Defense Mechanisms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Defense Mechanisms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber Defense Mechanisms"
Staszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (2019): 122–33. http://dx.doi.org/10.15804/rop201908.
Full textKingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Data-Driven Cyber Threat Intelligence: Leveraging Behavioral Analytics for Proactive Defense Mechanisms." Computer Science & IT Research Journal 4, no. 3 (2023): 502–24. http://dx.doi.org/10.51594/csitrj.v4i3.1501.
Full textSWAPNA, S. L., and Vidya SIVALINGAM. "AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis." International Journal of Information Security and Cybercrime 14, no. 1 (2025): 76–87. https://doi.org/10.19107/ijisc.2025.01.05.
Full textAirlangga, Gregorius. "Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management." Buletin Ilmiah Sarjana Teknik Elektro 5, no. 4 (2023): 505–14. https://doi.org/10.12928/biste.v5i4.9415.
Full textAbdullateef Barakat. "AI-driven threat intelligence: Strengthening cyber defense mechanisms in international cybersecurity frameworks." International Journal of Science and Research Archive 14, no. 3 (2025): 598–615. https://doi.org/10.30574/ijsra.2025.14.3.0722.
Full textNobles, Calvin, and Ian Mcandrew. "The Intersectionality of Offensive Cybersecurity and Human Factors: A Position Paper." Scientific Bulletin 28, no. 2 (2023): 215–33. http://dx.doi.org/10.2478/bsaft-2023-0022.
Full textTalekar, P. R. "Cyber-Attacks on Blockchain Systems: Vulnerabilities, Implications, and Defense Mechanisms." International Journal of Advance and Applied Research 5, no. 23 (2024): 61–64. https://doi.org/10.5281/zenodo.13604313.
Full textKommisetty, Phani Durga Nanda Kishore, Bala Maruthi Subba Rao Kuppala, and Hussain Vali Buvvaji. "Transforming Cyber Defense: Anomaly Detection and Predictive Analytics for Automated Threat Response." International Journal of Engineering and Computer Science 11, no. 08 (2022): 25585–600. http://dx.doi.org/10.18535/ijecs/v11i08.4694.
Full textPell Reddy, Rajender. "Cyber Warfare: National Security Implications and Strategic Defense Mechanisms." International Journal of Computer Trends and Technology 73, no. 4 (2025): 48–59. https://doi.org/10.14445/22312803/ijctt-v73i4p107.
Full textOgugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu `, Shedrack Onwusinkwue, and Islam Ahmad Ibrahim Ahmad `. "COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES." Computer Science & IT Research Journal 5, no. 2 (2024): 293–310. http://dx.doi.org/10.51594/csitrj.v5i2.758.
Full textBooks on the topic "Cyber Defense Mechanisms"
Saini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. CRC Press LLC, 2021.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textCyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textBook chapters on the topic "Cyber Defense Mechanisms"
Pelizza, Annalisa, and Stefan Kuhlmann. "Mining Governance Mechanisms: Innovation Policy, Practice, and Theory Facing Algorithmic Decision-Making." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_29-1.
Full textPelizza, Annalisa, and Stefan Kuhlmann. "Mining Governance Mechanisms: Innovation Policy, Practice, and Theory Facing Algorithmic Decision-Making." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-09069-6_29.
Full textRavishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "Game Theory-Based Defense Mechanisms of Cyber Warfare." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8569-7_16.
Full textGulihar, Prachi, and B. B. Gupta. "A Taxonomy of Bitcoin Security Issues and Defense Mechanisms." In Machine Learning for Computer and Cyber Security. CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-9.
Full textCheng, Yexia, Yuejin Du, Jin Peng, Shen He, Jun Fu, and Baoxu Liu. "New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications." In Science of Cyber Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_12.
Full textLi, Jiacheng, Qiang Du, and Feifei Huang. "Research on Intrusion Detection Technology Based on CNN-SaLSTM." In Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2456-9_47.
Full textMao, Deming, Shuwen Zhang, Ling Zhang, and Yu Feng. "Game Theory Based Dynamic Defense Mechanism for SDN." In Machine Learning for Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9_21.
Full textPisal, Kshitij, and Sayak Roychowdhury. "Cyber-Defense Mechanism Considering Incomplete Information Using POMDP." In Proceedings of International Conference on Network Security and Blockchain Technology. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3182-6_1.
Full textLin, C. Y., and Simin Nadjm-Tehrani. "A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks." In Cyber-Physical Security for Critical Infrastructures Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_14.
Full textZhu, Zhiling, Tieming Chen, Qijie Song, Yiheng Lu, and Yulin Zheng. "ThreatResponder: Dynamic Markov-Based Defense Mechanism for Real-Time Cyber Threats." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-89360-5_5.
Full textConference papers on the topic "Cyber Defense Mechanisms"
Kumar, Kunal, Sourav Chakraborty, Prince Kumar, and Susmita Kar. "Blockchain-Based Defense Mechanisms for Mitigating Unnecessary Islanding in Microgrids Against Cyber- Attack." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10674777.
Full textChristina Deva Kirubai, J., and S. Silvia Priscila. "MLP-Based Defense Mechanisms Against Cyber Crime: Insights from Dataset-Driven Attack Prevention Strategies." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691068.
Full textVaibhav, Sahaj Saxena, Sajal Bhatia, and Navin Kumar. "Fortifying Artificial Pancreas: A Hardware-in-the-Loop Simulation Study of Cyber-Attacks and Defense Mechanisms." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724227.
Full textPrakash, V. S., P. Murugesan, P. Poongothai, Shivakumar B. N, P. Vijayakumar, and P. J. Shriidhar. "Artificial Intelligence in Cybersecurity: Enhancing Automated Defense Mechanisms to Combat Sophisticated Cyber Threats and Guarantee Digital Resilience." In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT). IEEE, 2024. https://doi.org/10.1109/gcat62922.2024.10923968.
Full textGupta, Shipra, and Shipra Agarwal. "Evolving Cyber Security Threats and Adaptive Defence Mechanisms: a Comprehensive Approach to Modern Challenges." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983101.
Full textGasmi, Younes, Noureddine Bali, Atif Karim, and Soufiane Belagoune. "An Advanced Defense Mechanism for Detecting False Data Injection Attacks in Cyber-Physical Systems through Feature Selection Based-Machine Learning Algorithms." In 2024 International Conference on Advances in Electrical and Communication Technologies (ICAECOT). IEEE, 2024. https://doi.org/10.1109/icaecot62402.2024.10828733.
Full textWebber, Franklin, Partha Pal, Paul Rubel, and Michael Atighetchi. "An abstract interface for cyber-defense mechanisms." In the 4th annual workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1413140.1413183.
Full textChablani, Dhrumil Sunil, Moleena Mohanta, and M. Kowsigan. "Analysis of Cyber Defense mechanisms using honeypots in Cloud Environment." In 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2022. http://dx.doi.org/10.1109/icac3n56670.2022.10074409.
Full textRavindran, K., Y. Wardei, A. Kodia, M. Iannelli, A. Adiththan, and Steven Drager. "Assessment of QoS adaptation and cyber-defense mechanisms in networked systems." In 2017 IEEE Conference on Dependable and Secure Computing. IEEE, 2017. http://dx.doi.org/10.1109/desec.2017.8073833.
Full textCrosby, Sean, Marco Carvalho, and Daniel Kidwell. "A layered approach to understanding network dependencies on moving target defense mechanisms." In the Eighth Annual Cyber Security and Information Intelligence Research Workshop. ACM Press, 2013. http://dx.doi.org/10.1145/2459976.2460017.
Full textReports on the topic "Cyber Defense Mechanisms"
Abassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.
Full text