Academic literature on the topic 'Cyber Defense Mechanisms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Defense Mechanisms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber Defense Mechanisms"

1

Staszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (2019): 122–33. http://dx.doi.org/10.15804/rop201908.

Full text
Abstract:
Ensuring cyber security in scope of cyber defense is currently among the top priorities of the EU Common Security and Defense Policy (CSDP). Matters included in scope of cyber defense are a competence of the Member States and cooperation at EU level in this area is governed by decisions of the EU Council based on unanimity. This means that the European Parliament (EP) in the field of cyber defens acts only as an opinion-forming body expressing its position through the adoption of non-legislative resolutions. The aim of the article is to analyze the content of these resolutions and present the
APA, Harvard, Vancouver, ISO, and other styles
2

Kingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Data-Driven Cyber Threat Intelligence: Leveraging Behavioral Analytics for Proactive Defense Mechanisms." Computer Science & IT Research Journal 4, no. 3 (2023): 502–24. http://dx.doi.org/10.51594/csitrj.v4i3.1501.

Full text
Abstract:
As the cyber threat landscape becomes increasingly sophisticated, traditional defense mechanisms often fall short in anticipating and mitigating advanced attacks. The paper explores the critical role of behavioral analytics in transforming cyber threat intelligence (CTI) into a proactive defense strategy. This study underscores the importance of analyzing user behavior patterns, network activity, and system interactions to detect anomalies that may indicate potential threats. By leveraging large datasets and advanced analytical techniques, organizations can move beyond reactive cybersecurity m
APA, Harvard, Vancouver, ISO, and other styles
3

SWAPNA, S. L., and Vidya SIVALINGAM. "AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis." International Journal of Information Security and Cybercrime 14, no. 1 (2025): 76–87. https://doi.org/10.19107/ijisc.2025.01.05.

Full text
Abstract:
The rapid evolution of cyber threats has made cybersecurity a critical priority for both organizations and individuals. As the complexity and frequency of these threats escalate, traditional defense mechanisms often fall short. Artificial Intelligence (AI) has emerged as a transformative force in the cybersecurity domain, offering innovative solutions to enhance threat detection, prevention, and response. This article explores the integration of AI in cybersecurity, beginning with an overview of its fundamental principles and applications. Key AI-driven solutions, such as machine learning algo
APA, Harvard, Vancouver, ISO, and other styles
4

Airlangga, Gregorius. "Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management." Buletin Ilmiah Sarjana Teknik Elektro 5, no. 4 (2023): 505–14. https://doi.org/10.12928/biste.v5i4.9415.

Full text
Abstract:
In light of escalating cyber threats, this study tackles the cybersecurity challenges in UAV systems, underscoring the limitations of static defense mechanisms. Traditional security approaches fall short against the sophisticated and evolving nature of cyber-attacks, particularly for UAVs that depend on real-time autonomy. Addressing this deficiency, we introduce an adaptive modular security system tailored for UAVs, enhancing resilience through real-time defensive adaptability. This system integrates scalable, modular components and employs machine learning techniques—specifically, neural net
APA, Harvard, Vancouver, ISO, and other styles
5

Abdullateef Barakat. "AI-driven threat intelligence: Strengthening cyber defense mechanisms in international cybersecurity frameworks." International Journal of Science and Research Archive 14, no. 3 (2025): 598–615. https://doi.org/10.30574/ijsra.2025.14.3.0722.

Full text
Abstract:
The rapid evolution of cyber threats in an increasingly interconnected world requires advanced solutions beyond traditional cyber security measures. The intelligence of threats given by Artificial Intelligence (AI) emerged as a transformative tool, improving the mechanisms of threat detection, prevention, and response. This study explores the role of AI in strengthening cyber defense in international cyber security structures. In order to analyze AI applications such as machine learning, Deep Education and behavioral analysis, research evaluates its effectiveness in reducing civilized cyber th
APA, Harvard, Vancouver, ISO, and other styles
6

Nobles, Calvin, and Ian Mcandrew. "The Intersectionality of Offensive Cybersecurity and Human Factors: A Position Paper." Scientific Bulletin 28, no. 2 (2023): 215–33. http://dx.doi.org/10.2478/bsaft-2023-0022.

Full text
Abstract:
Abstract This position paper delves into the complex interplay between proactive cyber defense mechanisms and inherent human susceptibilities. The researchers posit that as cyber systems advance in technical robustness, malicious entities progressively exploit human psychological tendencies and behavioral inconsistencies to circumvent security measures. These exploitations are not merely opportunistic but are strategic, leveraging a profound comprehension of human cognitive biases to undermine security infrastructures. The researchers argue for broadening the intellectual horizon in this domai
APA, Harvard, Vancouver, ISO, and other styles
7

Talekar, P. R. "Cyber-Attacks on Blockchain Systems: Vulnerabilities, Implications, and Defense Mechanisms." International Journal of Advance and Applied Research 5, no. 23 (2024): 61–64. https://doi.org/10.5281/zenodo.13604313.

Full text
Abstract:
Abstract: Block chain technology, introduced by Satoshi Nakamoto in 2008, has transformed various industries by offering a decentralized, immutable ledger for secure transactions. Despite its benefits, blockchain systems face significant cyber threats that compromise their integrity and functionality. This paper examines modern cyber-attacks on blockchain, focusing on vulnerabilities in consensus mechanisms like Proof-of-Work and Proof-of-Stake. We explore the impact of 51% attacks, Distributed Denial of Service (DDoS) attacks, smart contract vulnerabilities, and Sybil attacks. By analyzi
APA, Harvard, Vancouver, ISO, and other styles
8

Kommisetty, Phani Durga Nanda Kishore, Bala Maruthi Subba Rao Kuppala, and Hussain Vali Buvvaji. "Transforming Cyber Defense: Anomaly Detection and Predictive Analytics for Automated Threat Response." International Journal of Engineering and Computer Science 11, no. 08 (2022): 25585–600. http://dx.doi.org/10.18535/ijecs/v11i08.4694.

Full text
Abstract:
Currently, cyber defense remains a pre-eminently human-driven endeavor, lacking fundamental capabilities for comprehensive and timely detection, response, and prediction. Here, we present transformative concepts to mature cyber defense toward automated anomaly detection, prediction, and response. Our concepts treat the underlying problem at its most basic and essential level: violation of the predictability of correct actions and correct system and service performance, representing unintended relationships and change. We mathematically generalize prediction to explore relationships between dep
APA, Harvard, Vancouver, ISO, and other styles
9

Pell Reddy, Rajender. "Cyber Warfare: National Security Implications and Strategic Defense Mechanisms." International Journal of Computer Trends and Technology 73, no. 4 (2025): 48–59. https://doi.org/10.14445/22312803/ijctt-v73i4p107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu `, Shedrack Onwusinkwue, and Islam Ahmad Ibrahim Ahmad `. "COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES." Computer Science & IT Research Journal 5, no. 2 (2024): 293–310. http://dx.doi.org/10.51594/csitrj.v5i2.758.

Full text
Abstract:
In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber threats has escalated, posing formidable challenges to individuals, organizations, and nations. This comprehensive review explores the contemporary panorama of cybersecurity, focusing on the latest threats and the advanced defense strategies employed to mitigate them. The analysis encompasses a wide spectrum of cyber threats, including malware, ransomware, phishing attacks, and advanced persistent threats (APTs), shedding light on their evolving tactics, techniques, and procedures. The review delves into the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber Defense Mechanisms"

1

Saini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. CRC Press LLC, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber Defense Mechanisms"

1

Pelizza, Annalisa, and Stefan Kuhlmann. "Mining Governance Mechanisms: Innovation Policy, Practice, and Theory Facing Algorithmic Decision-Making." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_29-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pelizza, Annalisa, and Stefan Kuhlmann. "Mining Governance Mechanisms: Innovation Policy, Practice, and Theory Facing Algorithmic Decision-Making." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-09069-6_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ravishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "Game Theory-Based Defense Mechanisms of Cyber Warfare." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8569-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gulihar, Prachi, and B. B. Gupta. "A Taxonomy of Bitcoin Security Issues and Defense Mechanisms." In Machine Learning for Computer and Cyber Security. CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Yexia, Yuejin Du, Jin Peng, Shen He, Jun Fu, and Baoxu Liu. "New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications." In Science of Cyber Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jiacheng, Qiang Du, and Feifei Huang. "Research on Intrusion Detection Technology Based on CNN-SaLSTM." In Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2456-9_47.

Full text
Abstract:
AbstractAs Internet-connected application devices become more and more popular, more and more services need to be done through the network, which also leads to users paying more attention to network security performance. Due to the continuous iterative development of cyber attack means and attack scale, it is difficult to conduct passive security detection systems such as traditional intrusion detection mechanisms to conduct endless attacks. Later, intrusion detection was studied as an active defense technique to compensate for the shortcomings of traditional safety detection techniques. Activ
APA, Harvard, Vancouver, ISO, and other styles
7

Mao, Deming, Shuwen Zhang, Ling Zhang, and Yu Feng. "Game Theory Based Dynamic Defense Mechanism for SDN." In Machine Learning for Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pisal, Kshitij, and Sayak Roychowdhury. "Cyber-Defense Mechanism Considering Incomplete Information Using POMDP." In Proceedings of International Conference on Network Security and Blockchain Technology. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3182-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, C. Y., and Simin Nadjm-Tehrani. "A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks." In Cyber-Physical Security for Critical Infrastructures Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_14.

Full text
Abstract:
AbstractSupervisory and Data Acquisition (SCADA) systems control and monitor modern power networks. As attacks targeting SCADA systems are increasing, significant research is conducted to defend SCADA networks including variations of anomaly detection. Due to the sensitivity of real data, many defence mechanisms have been tested only in small testbeds or emulated traffic that were designed with assumptions on how SCADA systems behave. This work provides a timing characterization of IEC-104 spontaneous traffic and compares the results from emulated traffic and real traffic to verify if the netw
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Zhiling, Tieming Chen, Qijie Song, Yiheng Lu, and Yulin Zheng. "ThreatResponder: Dynamic Markov-Based Defense Mechanism for Real-Time Cyber Threats." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-89360-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber Defense Mechanisms"

1

Kumar, Kunal, Sourav Chakraborty, Prince Kumar, and Susmita Kar. "Blockchain-Based Defense Mechanisms for Mitigating Unnecessary Islanding in Microgrids Against Cyber- Attack." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10674777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christina Deva Kirubai, J., and S. Silvia Priscila. "MLP-Based Defense Mechanisms Against Cyber Crime: Insights from Dataset-Driven Attack Prevention Strategies." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vaibhav, Sahaj Saxena, Sajal Bhatia, and Navin Kumar. "Fortifying Artificial Pancreas: A Hardware-in-the-Loop Simulation Study of Cyber-Attacks and Defense Mechanisms." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prakash, V. S., P. Murugesan, P. Poongothai, Shivakumar B. N, P. Vijayakumar, and P. J. Shriidhar. "Artificial Intelligence in Cybersecurity: Enhancing Automated Defense Mechanisms to Combat Sophisticated Cyber Threats and Guarantee Digital Resilience." In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT). IEEE, 2024. https://doi.org/10.1109/gcat62922.2024.10923968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Shipra, and Shipra Agarwal. "Evolving Cyber Security Threats and Adaptive Defence Mechanisms: a Comprehensive Approach to Modern Challenges." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gasmi, Younes, Noureddine Bali, Atif Karim, and Soufiane Belagoune. "An Advanced Defense Mechanism for Detecting False Data Injection Attacks in Cyber-Physical Systems through Feature Selection Based-Machine Learning Algorithms." In 2024 International Conference on Advances in Electrical and Communication Technologies (ICAECOT). IEEE, 2024. https://doi.org/10.1109/icaecot62402.2024.10828733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Webber, Franklin, Partha Pal, Paul Rubel, and Michael Atighetchi. "An abstract interface for cyber-defense mechanisms." In the 4th annual workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1413140.1413183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chablani, Dhrumil Sunil, Moleena Mohanta, and M. Kowsigan. "Analysis of Cyber Defense mechanisms using honeypots in Cloud Environment." In 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2022. http://dx.doi.org/10.1109/icac3n56670.2022.10074409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ravindran, K., Y. Wardei, A. Kodia, M. Iannelli, A. Adiththan, and Steven Drager. "Assessment of QoS adaptation and cyber-defense mechanisms in networked systems." In 2017 IEEE Conference on Dependable and Secure Computing. IEEE, 2017. http://dx.doi.org/10.1109/desec.2017.8073833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crosby, Sean, Marco Carvalho, and Daniel Kidwell. "A layered approach to understanding network dependencies on moving target defense mechanisms." In the Eighth Annual Cyber Security and Information Intelligence Research Workshop. ACM Press, 2013. http://dx.doi.org/10.1145/2459976.2460017.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber Defense Mechanisms"

1

Abassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.

Full text
Abstract:
The strategic convergence between Russia, Iran, and China poses a growing systemic threat to the European Union. Despite differing regional agendas, these three powers are increasingly aligned in key areas such as cybersecurity, military technology transfers, intelligence cooperation, and disinformation campaigns. Their coordinated efforts undermine the EU’s critical infrastructure, weaken its strategic autonomy, and erode trust in democratic institutions by targeting sectors such as energy, finance, healthcare, and electoral integrity. Although the EU has implemented sanctions and reinforced
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!