To see the other types of publications on this topic, follow the link: Cyber defense.

Journal articles on the topic 'Cyber defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Staszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (2019): 122–33. http://dx.doi.org/10.15804/rop201908.

Full text
Abstract:
Ensuring cyber security in scope of cyber defense is currently among the top priorities of the EU Common Security and Defense Policy (CSDP). Matters included in scope of cyber defense are a competence of the Member States and cooperation at EU level in this area is governed by decisions of the EU Council based on unanimity. This means that the European Parliament (EP) in the field of cyber defens acts only as an opinion-forming body expressing its position through the adoption of non-legislative resolutions. The aim of the article is to analyze the content of these resolutions and present the
APA, Harvard, Vancouver, ISO, and other styles
2

Tabansky, Lior. "Israel Defense Forces and National Cyber Defense." Connections: The Quarterly Journal 19, no. 1 (2020): 45–62. http://dx.doi.org/10.11610/connections.19.1.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saydjari, O. Sami. "Cyber defense." Communications of the ACM 47, no. 3 (2004): 52–57. http://dx.doi.org/10.1145/971617.971645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gao, Chungang, Yongjie Wang, and Xinli Xiong. "A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/3949292.

Full text
Abstract:
Increasingly, cyber security personnel are using cyber deception defense techniques to deal with network intrusions. However, traditional cyber deception techniques (such as honeypots and honeynets) are easily detected by attackers, thus leading to failure. Therefore, we propose a cyber deception defense method based on the signal game to improve the effectiveness of the defense. More specifically, first, we propose a moving target defense (MTD) enhanced cyber deception defense mechanism. Then, on the basis of the in-depth analysis of network attack and defense scenarios, a signal game model i
APA, Harvard, Vancouver, ISO, and other styles
5

Raio, Stephen, Kevin Corder, Travis W. Parker, et al. "Reinforcement Learning as a Path to Autonomous Intelligent Cyber-Defense Agents in Vehicle Platforms." Applied Sciences 13, no. 21 (2023): 11621. http://dx.doi.org/10.3390/app132111621.

Full text
Abstract:
Technological advancement of vehicle platforms exposes opportunities for new attack paths and vulnerabilities. Static cyber defenses can help mitigate certain attacks, but those attacks must generally be known ahead of time, and the cyber defenses must be hand-crafted by experts. This research explores reinforcement learning (RL) as a path to achieve autonomous, intelligent cyber defense of vehicle control networks—namely, the controller area network (CAN) bus. We train an RL agent for the CAN bus using Toyota’s Portable Automotive Security Testbed with Adaptability (PASTA). We then apply the
APA, Harvard, Vancouver, ISO, and other styles
6

Rudy, Agus Gemilang Gultom, and Farid Wajdi Ahmad. "Development of Six Ware Cyber Defense Framework (SWCDF) Design as a Standardization of Computer Network Protection State Defense Information System." International Journal of Arts and Social Science 5, no. 3 (2023): 293–310. https://doi.org/10.5281/zenodo.7751136.

Full text
Abstract:
: Cyber attacks are actions aimed at altering, disrupting, deceiving, degrading, or destroying information technology systems and their networks or existing information and programs (flowing) and stored in the system. Development of a cyber defense system for critical military infrastructure, and building readiness in the face of cyber warfare because the virtual world is a battlefield that will determine victory in war. This study aims to find an effective cyber defense system design to protect the Ministry of Defense's critical infrastructure and state defense information system (Sisinfo
APA, Harvard, Vancouver, ISO, and other styles
7

Wahyuni, Rifani Agnes Eka, Surryanto Djoko Waluyo, and Haposan Simatupang. "STRENGTHENING THE CYBER DEFENSE CENTER OF THE MINISTRY OF DEFENCE OF THE REPUBLIC OF INDONESIA (PUSDATIN KEMHAN) TO SUPPORT THE INDONESIAN DEFENSE DIPLOMACY IN CYBER DEFENSE SECURITY COOPERATION IN ASEAN." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 3 (2021): 511. http://dx.doi.org/10.33172/jp.v7i3.747.

Full text
Abstract:
<div><p class="Els-history-head">The development of information technology in the international world impacts cyberspace, covering all aspects of national life. So, the government must understand the condition of cyber security in Indonesia and build a national defense system to overcome various threats that come through cyberspace. ASEAN has become one of the platforms for Indonesia to fight for its national interests to support national security in the cyber field. The purpose of this research is to analyze the efforts to strengthen the national defense system based on five aspec
APA, Harvard, Vancouver, ISO, and other styles
8

Du, Yinuo, Baptiste Prébot, Xiaoli Xi, and Cleotilde Gonzalez. "Towards Autonomous Cyber Defense: Predictions from a cognitive model." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 1121–25. http://dx.doi.org/10.1177/1071181322661504.

Full text
Abstract:
We propose that cognitive models will help advance autonomous cyber defense. Congitive models, in contrast to many other sophisticated approaches, such as machine learning models, have the ability to represent human actions, account for human cognitive constraints, and make more accurate predictions of the decisions a human would make. The success of cyber defense largely depends on the ability to predict the attacker’s actions, and expert cyber defenders acquire such an ability through experience. We propose a cognitive model of a cyber defender and demonstrate the model’s predictions in a si
APA, Harvard, Vancouver, ISO, and other styles
9

KRASNIKOV, S. "Organizational and legal framework of strengthening state capacities in the field of cyber defense." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 155–61. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248846.

Full text
Abstract:
The issue of providing cyber defense has been detailed. Domestic strategic documents on cyber security and cyber defense are considered. The principles of implementation of the state military policy for the purpose of development of cyber defense potential are fixed. Prospects for the formation of cyber troops in Ukraine are outlined. NATO's approach to the concept and features of cyber defense is revealed. The Turkish experience of providing state cyber defense is highlighted. The prospects of improving the cyber defense potential of our country are identified, taking into account the effecti
APA, Harvard, Vancouver, ISO, and other styles
10

Du, Yinuo, Baptiste Prebot, and Cleotilde Gonzalez. "Turing-like Experiment in a Cyber Defense Game." Proceedings of the AAAI Symposium Series 3, no. 1 (2024): 547–50. http://dx.doi.org/10.1609/aaaiss.v3i1.31271.

Full text
Abstract:
During the past decade, researchers of behavioral cyber security have created cognitive agents that are able to learn and make decisions in dynamic environments in ways that assimilate human decision processes. However, many of these efforts have been limited to simple detection tasks and represent basic cognitive functions rather than a whole set of cognitive capabilities required in dynamic cyber defense scenarios. Our current work aims at advancing the development of cognitive agents that learn and make defense-dynamic decisions during cyber attacks by intelligent attack agents. We also aim
APA, Harvard, Vancouver, ISO, and other styles
11

Gutzwiller, Robert, Kimberly Ferguson-Walter, Sunny Fugate, and Andrew Rogers. "“Oh, Look, A Butterfly!” A Framework For Distracting Attackers To Improve Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (2018): 272–76. http://dx.doi.org/10.1177/1541931218621063.

Full text
Abstract:
Inverting human factors can aid in cyber defense by flipping well-known guidelines and using them to de-grade and disrupt the performance of a cyber attacker. There has been significant research on how we perform cyber defense tasks and how we should present information to operators, cyber defenders, and analysts to make them more efficient and more effective. We can actually create these situations just as easily as we can mitigate them. Oppositional human factors are a new way to apply well-known research on human attention allocation to disrupt potential cyber attackers and provide much-nee
APA, Harvard, Vancouver, ISO, and other styles
12

Galinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.

Full text
Abstract:
Cyber security encompasses a broad range of practices, tools and concepts related closely to those of information and operational technology security. Cyber security is distinctive in its inclusion of the offensive use of information technology to attack adversaries. Use of the term cyber security as a key challenge and a synonym for information security or IT security misleads customers and security practitioners and obscures critical differences between these disciplines. Recommendation for security leaders is that they should use the term cyber security to designate only security practices
APA, Harvard, Vancouver, ISO, and other styles
13

Vernez, Gerald. "Cyber-defense: Quo vadis?" Vojno delo 67, no. 2 (2015): 27–39. http://dx.doi.org/10.5937/vojdelo1502027v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mogos, Gabriela. "Biometrics in cyber defense." MATEC Web of Conferences 309 (2020): 02003. http://dx.doi.org/10.1051/matecconf/202030902003.

Full text
Abstract:
Biometric identification is an up and coming authentication method. The growing complexity of and overlap between smart devices, usability patterns and security risks make a strong case for securer and safer user authentication. This paper aims to offer a broad literature review on iris recognition and biometric cryptography to better understand current practices, propose possible future enhancements and anticipate possible future usability and security developments.
APA, Harvard, Vancouver, ISO, and other styles
15

Hakim, Edho Aqmal. "How does the Goverment Legally Respond to the Cyber Attack? Cases in Australia, People's Republic of China, and India." NEGREI: Academic Journal of Law and Governance 1, no. 1 (2021): 11. http://dx.doi.org/10.29240/negrei.v1i1.2570.

Full text
Abstract:
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India. Literature study provides a variety of information that is processed by comparative analysis. Three countries have their own approach to answer this cyber attacks issue by founded their own cyber security agencies. In recent years, these countries were able to develop and integrated strong defense mechanism against cyber attacks. While international cooperation and internati
APA, Harvard, Vancouver, ISO, and other styles
16

Ravindar, Reddy Gopireddy. "Reinforcement Learning for Cyber Defense: Adaptive and Autonomous Security Systems." European Journal of Advances in Engineering and Technology 10, no. 10 (2023): 102–5. https://doi.org/10.5281/zenodo.13623055.

Full text
Abstract:
The security threats have become so advanced and ubiquitous that traditional safety nets are often no longer enough to protect us from the fluid nature of these new forms of cyber assault. We present a state-of-the-art of reinforcement learning (RL) to create self-adaptable and autonomic security systems for cyber defense. Using RL, these systems can learn on-the-fly and update their defenses in real-time based on new threats. We survey current literature, propose an RL-based cyber defense framework and illustrate the applicability of these systems to real-world environments for widespread usa
APA, Harvard, Vancouver, ISO, and other styles
17

Christopher, L. Gorham. "Developing Enterprise Cyber Situational Awareness." International Journal of Managing Information Technology (IJMIT) 12, no. 3 (2020): 1 to 8. https://doi.org/10.5281/zenodo.4023854.

Full text
Abstract:
This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards addin
APA, Harvard, Vancouver, ISO, and other styles
18

LOKESH, PANDIBOTI, and SMT .A.ANUSHA. "Identification of Cyber Attacks Using Machine Learning." Journal of Engineering Sciences 16, no. 04 (2025): 126–32. https://doi.org/10.36893/jes.2025.v16i04.021.

Full text
Abstract:
Cyber security professionals pay greater regard to risk evaluation and propose techniques for mitigating. Throughout the area of cyber defense, designing successful strategies was a plan set. Machine learning also increasingly become an important concern in data protection although machine learning is successful in cyber defense. The rapid expansion in Cloud Computing, networking and evolutionary computation has been the result of unprecedented developments in computing, storage and computational technology. The planet is rapidly being digitizested - there is a growing want of comprehensive an
APA, Harvard, Vancouver, ISO, and other styles
19

Danуk, Y., and S. Vdovenko. "PROBLEMS AND PROSPECTS OF ENSURING A STATE CYBER DEFENSE." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 66 (2019): 75–90. http://dx.doi.org/10.17721/2519-481x/2020/66-08.

Full text
Abstract:
The growing role and importance of solving the problems of cybersecurity and cyber defense is due to the innovative development of information, electronic and cyber technologies, which are the driving force behind a number of trends in military affairs. Due to the formation and recognition of the artificial fifth space - cyberspace, as a separate area of struggle between states, including armed confrontation, issues of cybersecurity and cyber defense have become urgent in ensuring national security and defense of developed states, which pay special attention to the formation and development of
APA, Harvard, Vancouver, ISO, and other styles
20

MANUILOV, Y. "About the concept of the organizational and technical model of cyber defense." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 115–22. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238345.

Full text
Abstract:
The current threats to cyber security in modern conditions have been identified. The components of the functioning of the national cyber security system are regulated. The powers of the State Special Communications Service in the field of building effective cyber defense in the domestic territory are outlined. The directions of development of organizational and technical model of the national cyber defense system are detailed. The components of the organizational and technical model of cyber defense are generalized. The expediency of accelerating the approval at the state level of the Concept
APA, Harvard, Vancouver, ISO, and other styles
21

Zvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.

Full text
Abstract:
The focus of the article revolves around NATO’s roadmap of smart defense against cyber attacks as the bedrock of Euro-Atlantic security. The author discloses NATO’S new policy and cutting-edge technical initiatives, aimed at focusing on countering global threats and cyber security challenges. It is stressed out, that new ideas towards a more synergetic approach between all the NATO Cyber Defense agencies should be explored to develop a shared framework for cybersecurity that might provide up-to-the date intelligence in order to ensure the development, acquisition and maintenance of the necessa
APA, Harvard, Vancouver, ISO, and other styles
22

Khydyntsev, M. M., V. Yu Zubok, and I. L. Palazhchenko. "Approaches to the Analysis of Sets of Cyber Statistics Indicators." Èlektronnoe modelirovanie 46, no. 6 (2024): 72–96. https://doi.org/10.15407/emodel.46.06.072.

Full text
Abstract:
The work is devoted to solving the urgent problem of assessing cybersecurity, the state of cyber defense, cyber resilience (cyber resilience) at the facility, sectoral, national and interna-tional levels by forming sets and analyzing cyber statistics data, which is gradually being sepa-rated into a special area of cybersecurity. The terminological base for collecting and processing cyber statistics data was analyzed and developed as well as the existing and new approaches to the formation of sets of cyber statistics indicators were proposed. Existing practices (established practices, framework
APA, Harvard, Vancouver, ISO, and other styles
23

Alex Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. http://dx.doi.org/10.30574/wjarr.2024.22.1.1305.

Full text
Abstract:
This paper will delve into the integration of Artificial Intelligence (AI) and extended Berkeley Packet Filter (eBPF) technology to enhance cyber defense capability. The most important aspect of AI is detection of threats where it employs sophisticated algorithms in the analysis of large data sets to identify any form of pattern which signals a threat in cyberspace. It enhances behavioral analysis in the monitoring of user and system behavior to identify suspicious activities. AI also helps to instantly react against the threats by automatically taking actions like isolating an infected machin
APA, Harvard, Vancouver, ISO, and other styles
24

Alex, Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. https://doi.org/10.5281/zenodo.14244163.

Full text
Abstract:
This paper will delve into the integration of Artificial Intelligence (AI) and extended Berkeley Packet Filter (eBPF) technology to enhance cyber defense capability. The most important aspect of AI is detection of threats where it employs sophisticated algorithms in the analysis of large data sets to identify any form of pattern which signals a threat in cyberspace. It enhances behavioral analysis in the monitoring of user and system behavior to identify suspicious activities. AI also helps to instantly react against the threats by automatically taking actions like isolating an infected machin
APA, Harvard, Vancouver, ISO, and other styles
25

Wan, Ying, and Jinde Cao. "A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks." Sensors 23, no. 8 (2023): 4013. http://dx.doi.org/10.3390/s23084013.

Full text
Abstract:
Complex cyber–physical networks combine the prominent features of complex networks and cyber–physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal operation. Many vital infrastructures, such as electrical power grids, can be effectively modeled as complex cyber–physical networks. Given the growing importance of complex cyber–physical networks, the issue of their cybersecurity has become a significant concern in both industry and academic fields. This survey is focused on some recent developments and methodolo
APA, Harvard, Vancouver, ISO, and other styles
26

Đekić, Milica. "Incident response as a key factor of defense." Tehnika 75, no. 6 (2020): 809–13. http://dx.doi.org/10.5937/tehnika2006809d.

Full text
Abstract:
According to the ancient Chinese learning our world is governed by two opposite forces being Yin and Yang. Those forces are the force of offense and force of defense and by the same doctrine our world can be in harmony only if those two forces are in balance. The modern security experts would also see a security as a balance between attack and defense. So many defense professionals worldwide would approach their everyday tasks with such an assumption. The similar situation is with the cyber defense - the cybersecurity researchers and practitioners would see cyber defense as a balance between c
APA, Harvard, Vancouver, ISO, and other styles
27

Bos, Nathan, Celeste Lyn Paul, John R. Gersh, et al. "Effects of Gain/Loss Framing in Cyber Defense Decision-Making." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 168–72. http://dx.doi.org/10.1177/1541931213601038.

Full text
Abstract:
Cyber defense requires decision making under uncertainty, yet this critical area has not been a focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ “moving target” defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a c
APA, Harvard, Vancouver, ISO, and other styles
28

Fink, Glenn A., Jereme N. Haack, A. David McKinnon, and Errin W. Fulp. "Defense on the Move: Ant-Based Cyber Defense." IEEE Security & Privacy 12, no. 2 (2014): 36–43. http://dx.doi.org/10.1109/msp.2014.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Huntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.

Full text
Abstract:
The study of cyber strategy and its implications for international security has become increasingly crucial, necessitating an examination of the unique challenges posed by the dynamic and stealthy nature of the cyber domain. This paper addresses whether offensive or defensive strategies prevail in cyberspace, especially in light of evolving technological landscapes and debates over cyber threats. By applying offense-defense theory from international relations, the research explores the nuanced relationship between offensive and defensive operations in cyberspace. Despite prevalent views favori
APA, Harvard, Vancouver, ISO, and other styles
30

Wardana, Achmad, Gunaryo Gunaryo, and Y. H. Yogaswara. "Development of Cyber Weapons to Improve Indonesia's Cyber Security." Journal of Sosial Science 3, no. 3 (2022): 453–59. http://dx.doi.org/10.46799/jss.v3i3.334.

Full text
Abstract:
It is indisputable that technical advancements have an impact on a country's military capability and security. This is inextricably linked to the deployment of numerous technologies and new discoveries aimed at boosting the military's defense system. As a result of this predicament, all governments are attempting to modernize their defense systems in order to deal with dangers posed by technological advancements. This is both a challenge and an opportunity for Indonesia's existing defense system. The goal of this study is to look into the development of cyber weapons and how they may help Indo
APA, Harvard, Vancouver, ISO, and other styles
31

AVANESOVA, N. E., Y. I. SERHIIENKO, and R. A. LYUBUSHIN. "STRENGTHENING THE STATE CYBER DEFENSE AND CREATING OF CYBER TROOPS: STATE, PROBLEMS AND ORGANIZATIONAL-ECONOMIC MEASURES FOR UKRAINE." Economic innovations 24, no. 1(82) (2022): 25–40. http://dx.doi.org/10.31520/ei.2022.24.1(82).25-40.

Full text
Abstract:
Topicality. In the last decade, cyberspace has become the fifth separate, specific and important area of armed struggle, along with four traditional ones - "Earth", "Sea", "Air" and "Space". The use of cyber troops and cyber weapons, cyber defense, cyber operations and cyber-attacks is now considered commonplace. Since 2014, Ukraine has been forced to repel hybrid Russian armed aggression, including in cyberspace. But the recognition of cyber defense as a new important component of its defense took place only in March 2016 in the Cyber Security Strategy of Ukraine [1] (hereinafter - the Strate
APA, Harvard, Vancouver, ISO, and other styles
32

Tobias, D’Andre, Joseph Chedzoy, Joseph Miller, Max Hwang, and Trent Geisler. "Reinforcement Learning in Cyber Wargaming Defense." Industrial and Systems Engineering Review 11, no. 1-2 (2023): 60–66. http://dx.doi.org/10.37266/iser.2023v11i1-2.pp60-66.

Full text
Abstract:
In recent decades the necessity for cyber security has grown for both private companies as well as government agencies. This growth is the result of increasing ability for organizations to mount cyber-attacks. As a response, organizations have been developing cyber defense artificial intelligence (AI), which greatly improves cyber-security capabilities. This ne- cessitates not only the development of cyber-attack, defense, and vulnerability frameworks to simulate a realistic environment, but also methods with which to train the AI. Further, the number and variety of networks necessitates a fra
APA, Harvard, Vancouver, ISO, and other styles
33

M. Sandhya Rani, Guda Ankitha, Polasani Harini, and G Ravi. "Cyber Honeypot." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 94–98. http://dx.doi.org/10.32628/ijsrst52411168.

Full text
Abstract:
In an era of escalating cyber threats, the need for robust defenses against malicious activities is paramount. In this project, we propose a novel approach to leverage honeypots in conju nction with Canary Tokens to accurately pinpoint the geographical locations of attackers. By strategically deploying these decoy resources across diverse network environments, we capture valuable data on unauthorized access attempts and malicious behavior. Through the analysis of Canary Tokens, which act as unique identifiers triggered upon interaction, we can trace the origin of these attacks to specific IP a
APA, Harvard, Vancouver, ISO, and other styles
34

Primawanti, Henike, Sarwo Edi Wibowo, Ari Hartono, Hendri Kiswanto, and Jafirman Torang Avery Louerens. "Securitization of Cyber Threats to the Indonesian Government:A Study of Cyber Defense Strategy." Global Political Studies Journal 8, no. 2 (2024): 97–108. https://doi.org/10.34010/gpsjournal.v8i2.13817.

Full text
Abstract:
The research aims to analyze the cyber threats faced by Indonesia and the issues in them. To achieve this goal, this research explores the Indonesian government's view of cyber security as a non-traditional security threat and the Indonesian government's approach to dealing with cyber threats. It examines the extent to which securitization is carried out by various actors representing the Indonesian government. This research uses a qualitative method with an analytical descriptive form that utilizes direct and indirect sources such as interviews with several informants, literature studies, and
APA, Harvard, Vancouver, ISO, and other styles
35

Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu `, Shedrack Onwusinkwue, and Islam Ahmad Ibrahim Ahmad `. "COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES." Computer Science & IT Research Journal 5, no. 2 (2024): 293–310. http://dx.doi.org/10.51594/csitrj.v5i2.758.

Full text
Abstract:
In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber threats has escalated, posing formidable challenges to individuals, organizations, and nations. This comprehensive review explores the contemporary panorama of cybersecurity, focusing on the latest threats and the advanced defense strategies employed to mitigate them. The analysis encompasses a wide spectrum of cyber threats, including malware, ransomware, phishing attacks, and advanced persistent threats (APTs), shedding light on their evolving tactics, techniques, and procedures. The review delves into the
APA, Harvard, Vancouver, ISO, and other styles
36

Yeremyan, A., and L. Yeremyan. "International Law Issues of Cyber Defense." Moscow Journal of International Law, no. 2 (July 6, 2022): 85–100. http://dx.doi.org/10.24833/0869-0049-2022-2-85-100.

Full text
Abstract:
INTRODUCTION. The world has many times faced cardinal changes triggered by technological development. Creation of the Internet and the emergence of the artificial intelligence have become the major trend of the ongoing changes with the signifi-cant potential to affect all spheres of live, including the military affairs and the geopolitical phenomena in general. In this paper, in particular, we discuss the opportunities and challenges of the rapid technological development in the defense sector in the context of globalization. The pace and the nature of changes in defense dictate the necessity to a
APA, Harvard, Vancouver, ISO, and other styles
37

Vieane, Alex, Gregory Funke, Eric Greenlee, et al. "Task Interruptions Undermine Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 375–79. http://dx.doi.org/10.1177/1541931213601576.

Full text
Abstract:
Computer network defense analysts engage a difficult, though critical, task in cyber defense. Anecdotally, these operators complain of frequent task interruptions while they are performing their duties. The goal for the current study was to investigate the effect of a commonly reported interruption, answering email, on accuracy and completion times in a simulated network analyst task. During task trials, participants were interrupted by emails between alert investigations, during alert investigations, or not at all (control). The results indicated that email interruptions increased alert compl
APA, Harvard, Vancouver, ISO, and other styles
38

Hill, Steven. "Cyber Defense Norms and NATO." Proceedings of the ASIL Annual Meeting 111 (2017): 145–46. http://dx.doi.org/10.1017/amp.2017.22.

Full text
Abstract:
How to address security challenges arising from new technologies like those discussed on today's panel is a key concern to NATO and NATO allies. At NATO headquarters in Brussels we have a division focused on such security challenges. NATO lawyers also spend time helping clients understand how international law applies to new technologies. At the same time, the arms control agenda is a matter of core concern for NATO. We pay very close attention to the integrity of that system. As a result, I appreciate the opportunity to appear here today to present some of what we are doing at NATO on these i
APA, Harvard, Vancouver, ISO, and other styles
39

Mathew, Alex. "Threat Defense through Cyber Fusion." International Journal of Computer Science and Mobile Computing 12, no. 1 (2023): 24–27. http://dx.doi.org/10.47760/ijcsmc.2022.v12i01.003.

Full text
Abstract:
Using cyber fusion to detect advanced persistent threats (APTs) is a complex task requiring integrating and correlating multiple sources of information and data. APTs are a specific type of cyber-attack where an attacker establishes a long-term, undetected presence on a target's network to steal sensitive information or disrupt operations. Due to the nature of APTs, it can be hard to detect them and take action. However, using threat intelligence is also a key component of APT detection. It provides actionable information about new APTs and the tactics and techniques used by APT attackers, all
APA, Harvard, Vancouver, ISO, and other styles
40

Bashkyrov, O. M., O. P. Krushenytskyi, and A. Yu Dmytrenko. "ADVANCED INFORMATION TECHNOLOGIES FOR THE TRAINING OF CYBER DEFENCE SPECIALISTS OF THE SECURITY AND DEFENCE SECTOR OF UKRAINE." Scientific Notes of Junior Academy of Sciences of Ukraine, no. 1(29) (2024): 21–29. http://dx.doi.org/10.51707/2618-0529-2024-29-03.

Full text
Abstract:
In recent years, russian intelligence agencies have demonstrated the capability to overcome security measures even in well-protected companies and government networks worldwide, including the security system of the U. S. military base on Guam. According to estimates from the Security Service of Ukraine, russia is currently carrying out around 10 cyber attacks on Ukraine daily. Therefore, the training of cybersecurity professionals for our country, especially in the sector of security and defense in Ukraine, is now an urgent and relevant task. Establishing a robust information security system f
APA, Harvard, Vancouver, ISO, and other styles
41

Aththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA." Edukasi IPS 5, no. 2 (2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.

Full text
Abstract:
This study argues that currently the threat of cyber attacks has become a real threat that has the potential to grow during the Covid-19 pandemic. The concept of a universal defense system can be used as strategy to deal with cyber threats. This research using a qualitative method with a literature review approach that focuses on the threat of cyber attacks in Indonesia during the Covid-19 pandemic. The purpose of this study is to find out how the threat of cyber attacks in Indonesia during the Covid-19 pandemic is, and how the concept of a universal defense system can handle it. The theory us
APA, Harvard, Vancouver, ISO, and other styles
42

Airlangga, Gregorius. "Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management." Buletin Ilmiah Sarjana Teknik Elektro 5, no. 4 (2023): 505–14. https://doi.org/10.12928/biste.v5i4.9415.

Full text
Abstract:
In light of escalating cyber threats, this study tackles the cybersecurity challenges in UAV systems, underscoring the limitations of static defense mechanisms. Traditional security approaches fall short against the sophisticated and evolving nature of cyber-attacks, particularly for UAVs that depend on real-time autonomy. Addressing this deficiency, we introduce an adaptive modular security system tailored for UAVs, enhancing resilience through real-time defensive adaptability. This system integrates scalable, modular components and employs machine learning techniques—specifically, neural net
APA, Harvard, Vancouver, ISO, and other styles
43

Tiwari, Sundar, Vishal Sresth, and Aakash Srivastava. "The Role of Explainable AI in Cybersecurity: Addressing Transparency Challenges in Autonomous Defense Systems." International Journal of Innovative Research in Science, Engineering and Technology 09, no. 03 (2020): 718–33. https://doi.org/10.15680/ijirset.2020.0903165.

Full text
Abstract:
Two major and rapidly evolving domains that are becoming more integrated into military and defense activity, are cyber security and Artificial Intelligence. Cyber threatening has become sophisticated thus making the application of AI crucial in identifying as well as preventing assaults. In this paper, a review of advances in the area of cyber security and AI and their application relating to war and defense is provided. The work begins by providing an outline of the kinds of AI models deployed in cybersecurity, such as machine learning, natural language processing, and anomaly detection. This
APA, Harvard, Vancouver, ISO, and other styles
44

Azzani, Ihsania Karin, Susilo Adi Purwantoro, and Hikmat Zakky Almubarok. "Enhancing awareness of cyber crime: a crucial element in confronting the challenges of hybrid warfare In Indonesia." Defense and Security Studies 5 (January 5, 2024): 1–9. http://dx.doi.org/10.37868/dss.v5.id255.

Full text
Abstract:
The Cyber Defense Center, abbreviated as Pushansiber, is an institution responsible for carrying out the duties and functions of the Defense Strategic Installation Agency. Pushansiber has an important role in implementing governance, cooperation, operations, and ensuring cyber defense security. However, this year there has been an increase in problems related to cyber attacks, such as phishing, malware, ransomware, spam. These cyber attacks are included in the concept of hybrid warfare which is believed to be a form of conflict that involves the utilization of various elements, one of which is
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Kwang-Je, Taek-Shin Kang, Jae-Hong Kim, Seunghoon Jung, and Jong-Bae Kim. "Cyber Defense Development Plan based on Cyber Kill Chain." Asia-pacific Journal of Multimedia services convergent with Art, Humanities, and Sociology 7, no. 1 (2017): 277–85. http://dx.doi.org/10.14257/ajmahs.2017.01.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Duwi Wahyuni, Dhiah Ayu, Tri Legionosuko, and Sutrimo Sumarlan. "Cyber community empowerment policy as an effort to strengthen cyber defense." Strategi Perang Semesta 8, no. 1 (2022): 103. http://dx.doi.org/10.56555/sps.v8i1.1196.

Full text
Abstract:
The universal people's defense and security system is a defense system that involves all citizens, territories, and other national resources, prepared by the government early, implemented in a total, integrated, directed, sustainable and sustainable manner for the sake of upholding the sovereignty, and territorial integrity of the Unitary State of the Republic of Indonesia and its protection. The safety of the entire nation and from various threats. Its hoped that this principle will become a loyal basis for the formulation of defense policies in Indonesia, including those related to cyber com
APA, Harvard, Vancouver, ISO, and other styles
47

Bandyopadhyay, Tridib. "Understanding Optimal Investment in Cyber Terrorism." International Journal of Cyber Warfare and Terrorism 1, no. 2 (2011): 18–34. http://dx.doi.org/10.4018/ijcwt.2011040103.

Full text
Abstract:
In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment levels for countering cyber terrorism related risks. The proposed model characterizes the minimum budget below which a defending nation cannot feasibly contemplate to deploy more than one layer of defense a
APA, Harvard, Vancouver, ISO, and other styles
48

Haupt, Maria Elisabeth. "Carayannis/Campbell/Efthymiopoulos (eds.) (2014): Cyber-development, cyber-democracy and cyber-defense." Österreichische Zeitschrift für Politikwissenschaft 45, no. 2 (2016): 59. http://dx.doi.org/10.15203/ozp.1323.vol45iss2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Yuchen, and Jing Liu. "Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning." Security and Communication Networks 2019 (December 23, 2019): 1–16. http://dx.doi.org/10.1155/2019/3038586.

Full text
Abstract:
Existing approaches of cyber attack-defense analysis based on stochastic game adopts the assumption of complete rationality, but in the actual cyber attack-defense, it is difficult for both sides of attacker and defender to meet the high requirement of complete rationality. For this aim, the influence of bounded rationality on attack-defense stochastic game is analyzed. We construct a stochastic game model. Aiming at the problem of state explosion when the number of network nodes increases, we design the attack-defense graph to compress the state space and extract network states and defense st
APA, Harvard, Vancouver, ISO, and other styles
50

Venkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.

Full text
Abstract:
As cyber threats continue to evolve in complexity and scale, traditional security measures have become insufficient. Aegis AI (AAI): Intelligent Cyber Resilience presents a cutting-edge approach that integrates artificial intelligence (AI) and machine learning (ML) to strengthen cybersecurity defenses. This study explores the role of AI-driven threat intelligence, automated incident response, and adaptive learning in combating cyberattacks. The proposed AAI framework utilizes deep learning, anomaly detection, and reinforcement learning techniques to predict and mitigate threats in real time. B
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!