Journal articles on the topic 'Cyber defense'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber defense.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Staszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (2019): 122–33. http://dx.doi.org/10.15804/rop201908.
Full textTabansky, Lior. "Israel Defense Forces and National Cyber Defense." Connections: The Quarterly Journal 19, no. 1 (2020): 45–62. http://dx.doi.org/10.11610/connections.19.1.05.
Full textSaydjari, O. Sami. "Cyber defense." Communications of the ACM 47, no. 3 (2004): 52–57. http://dx.doi.org/10.1145/971617.971645.
Full textGao, Chungang, Yongjie Wang, and Xinli Xiong. "A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/3949292.
Full textRaio, Stephen, Kevin Corder, Travis W. Parker, et al. "Reinforcement Learning as a Path to Autonomous Intelligent Cyber-Defense Agents in Vehicle Platforms." Applied Sciences 13, no. 21 (2023): 11621. http://dx.doi.org/10.3390/app132111621.
Full textRudy, Agus Gemilang Gultom, and Farid Wajdi Ahmad. "Development of Six Ware Cyber Defense Framework (SWCDF) Design as a Standardization of Computer Network Protection State Defense Information System." International Journal of Arts and Social Science 5, no. 3 (2023): 293–310. https://doi.org/10.5281/zenodo.7751136.
Full textWahyuni, Rifani Agnes Eka, Surryanto Djoko Waluyo, and Haposan Simatupang. "STRENGTHENING THE CYBER DEFENSE CENTER OF THE MINISTRY OF DEFENCE OF THE REPUBLIC OF INDONESIA (PUSDATIN KEMHAN) TO SUPPORT THE INDONESIAN DEFENSE DIPLOMACY IN CYBER DEFENSE SECURITY COOPERATION IN ASEAN." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 3 (2021): 511. http://dx.doi.org/10.33172/jp.v7i3.747.
Full textDu, Yinuo, Baptiste Prébot, Xiaoli Xi, and Cleotilde Gonzalez. "Towards Autonomous Cyber Defense: Predictions from a cognitive model." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 1121–25. http://dx.doi.org/10.1177/1071181322661504.
Full textKRASNIKOV, S. "Organizational and legal framework of strengthening state capacities in the field of cyber defense." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 155–61. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248846.
Full textDu, Yinuo, Baptiste Prebot, and Cleotilde Gonzalez. "Turing-like Experiment in a Cyber Defense Game." Proceedings of the AAAI Symposium Series 3, no. 1 (2024): 547–50. http://dx.doi.org/10.1609/aaaiss.v3i1.31271.
Full textGutzwiller, Robert, Kimberly Ferguson-Walter, Sunny Fugate, and Andrew Rogers. "“Oh, Look, A Butterfly!” A Framework For Distracting Attackers To Improve Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (2018): 272–76. http://dx.doi.org/10.1177/1541931218621063.
Full textGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Full textVernez, Gerald. "Cyber-defense: Quo vadis?" Vojno delo 67, no. 2 (2015): 27–39. http://dx.doi.org/10.5937/vojdelo1502027v.
Full textMogos, Gabriela. "Biometrics in cyber defense." MATEC Web of Conferences 309 (2020): 02003. http://dx.doi.org/10.1051/matecconf/202030902003.
Full textHakim, Edho Aqmal. "How does the Goverment Legally Respond to the Cyber Attack? Cases in Australia, People's Republic of China, and India." NEGREI: Academic Journal of Law and Governance 1, no. 1 (2021): 11. http://dx.doi.org/10.29240/negrei.v1i1.2570.
Full textRavindar, Reddy Gopireddy. "Reinforcement Learning for Cyber Defense: Adaptive and Autonomous Security Systems." European Journal of Advances in Engineering and Technology 10, no. 10 (2023): 102–5. https://doi.org/10.5281/zenodo.13623055.
Full textChristopher, L. Gorham. "Developing Enterprise Cyber Situational Awareness." International Journal of Managing Information Technology (IJMIT) 12, no. 3 (2020): 1 to 8. https://doi.org/10.5281/zenodo.4023854.
Full textLOKESH, PANDIBOTI, and SMT .A.ANUSHA. "Identification of Cyber Attacks Using Machine Learning." Journal of Engineering Sciences 16, no. 04 (2025): 126–32. https://doi.org/10.36893/jes.2025.v16i04.021.
Full textDanуk, Y., and S. Vdovenko. "PROBLEMS AND PROSPECTS OF ENSURING A STATE CYBER DEFENSE." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 66 (2019): 75–90. http://dx.doi.org/10.17721/2519-481x/2020/66-08.
Full textMANUILOV, Y. "About the concept of the organizational and technical model of cyber defense." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 115–22. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238345.
Full textZvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.
Full textKhydyntsev, M. M., V. Yu Zubok, and I. L. Palazhchenko. "Approaches to the Analysis of Sets of Cyber Statistics Indicators." Èlektronnoe modelirovanie 46, no. 6 (2024): 72–96. https://doi.org/10.15407/emodel.46.06.072.
Full textAlex Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. http://dx.doi.org/10.30574/wjarr.2024.22.1.1305.
Full textAlex, Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. https://doi.org/10.5281/zenodo.14244163.
Full textWan, Ying, and Jinde Cao. "A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks." Sensors 23, no. 8 (2023): 4013. http://dx.doi.org/10.3390/s23084013.
Full textĐekić, Milica. "Incident response as a key factor of defense." Tehnika 75, no. 6 (2020): 809–13. http://dx.doi.org/10.5937/tehnika2006809d.
Full textBos, Nathan, Celeste Lyn Paul, John R. Gersh, et al. "Effects of Gain/Loss Framing in Cyber Defense Decision-Making." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 168–72. http://dx.doi.org/10.1177/1541931213601038.
Full textFink, Glenn A., Jereme N. Haack, A. David McKinnon, and Errin W. Fulp. "Defense on the Move: Ant-Based Cyber Defense." IEEE Security & Privacy 12, no. 2 (2014): 36–43. http://dx.doi.org/10.1109/msp.2014.21.
Full textHuntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Full textWardana, Achmad, Gunaryo Gunaryo, and Y. H. Yogaswara. "Development of Cyber Weapons to Improve Indonesia's Cyber Security." Journal of Sosial Science 3, no. 3 (2022): 453–59. http://dx.doi.org/10.46799/jss.v3i3.334.
Full textAVANESOVA, N. E., Y. I. SERHIIENKO, and R. A. LYUBUSHIN. "STRENGTHENING THE STATE CYBER DEFENSE AND CREATING OF CYBER TROOPS: STATE, PROBLEMS AND ORGANIZATIONAL-ECONOMIC MEASURES FOR UKRAINE." Economic innovations 24, no. 1(82) (2022): 25–40. http://dx.doi.org/10.31520/ei.2022.24.1(82).25-40.
Full textTobias, D’Andre, Joseph Chedzoy, Joseph Miller, Max Hwang, and Trent Geisler. "Reinforcement Learning in Cyber Wargaming Defense." Industrial and Systems Engineering Review 11, no. 1-2 (2023): 60–66. http://dx.doi.org/10.37266/iser.2023v11i1-2.pp60-66.
Full textM. Sandhya Rani, Guda Ankitha, Polasani Harini, and G Ravi. "Cyber Honeypot." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 94–98. http://dx.doi.org/10.32628/ijsrst52411168.
Full textPrimawanti, Henike, Sarwo Edi Wibowo, Ari Hartono, Hendri Kiswanto, and Jafirman Torang Avery Louerens. "Securitization of Cyber Threats to the Indonesian Government:A Study of Cyber Defense Strategy." Global Political Studies Journal 8, no. 2 (2024): 97–108. https://doi.org/10.34010/gpsjournal.v8i2.13817.
Full textOgugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu `, Shedrack Onwusinkwue, and Islam Ahmad Ibrahim Ahmad `. "COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES." Computer Science & IT Research Journal 5, no. 2 (2024): 293–310. http://dx.doi.org/10.51594/csitrj.v5i2.758.
Full textYeremyan, A., and L. Yeremyan. "International Law Issues of Cyber Defense." Moscow Journal of International Law, no. 2 (July 6, 2022): 85–100. http://dx.doi.org/10.24833/0869-0049-2022-2-85-100.
Full textVieane, Alex, Gregory Funke, Eric Greenlee, et al. "Task Interruptions Undermine Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 375–79. http://dx.doi.org/10.1177/1541931213601576.
Full textHill, Steven. "Cyber Defense Norms and NATO." Proceedings of the ASIL Annual Meeting 111 (2017): 145–46. http://dx.doi.org/10.1017/amp.2017.22.
Full textMathew, Alex. "Threat Defense through Cyber Fusion." International Journal of Computer Science and Mobile Computing 12, no. 1 (2023): 24–27. http://dx.doi.org/10.47760/ijcsmc.2022.v12i01.003.
Full textBashkyrov, O. M., O. P. Krushenytskyi, and A. Yu Dmytrenko. "ADVANCED INFORMATION TECHNOLOGIES FOR THE TRAINING OF CYBER DEFENCE SPECIALISTS OF THE SECURITY AND DEFENCE SECTOR OF UKRAINE." Scientific Notes of Junior Academy of Sciences of Ukraine, no. 1(29) (2024): 21–29. http://dx.doi.org/10.51707/2618-0529-2024-29-03.
Full textAththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA." Edukasi IPS 5, no. 2 (2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.
Full textAirlangga, Gregorius. "Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management." Buletin Ilmiah Sarjana Teknik Elektro 5, no. 4 (2023): 505–14. https://doi.org/10.12928/biste.v5i4.9415.
Full textTiwari, Sundar, Vishal Sresth, and Aakash Srivastava. "The Role of Explainable AI in Cybersecurity: Addressing Transparency Challenges in Autonomous Defense Systems." International Journal of Innovative Research in Science, Engineering and Technology 09, no. 03 (2020): 718–33. https://doi.org/10.15680/ijirset.2020.0903165.
Full textAzzani, Ihsania Karin, Susilo Adi Purwantoro, and Hikmat Zakky Almubarok. "Enhancing awareness of cyber crime: a crucial element in confronting the challenges of hybrid warfare In Indonesia." Defense and Security Studies 5 (January 5, 2024): 1–9. http://dx.doi.org/10.37868/dss.v5.id255.
Full textKim, Kwang-Je, Taek-Shin Kang, Jae-Hong Kim, Seunghoon Jung, and Jong-Bae Kim. "Cyber Defense Development Plan based on Cyber Kill Chain." Asia-pacific Journal of Multimedia services convergent with Art, Humanities, and Sociology 7, no. 1 (2017): 277–85. http://dx.doi.org/10.14257/ajmahs.2017.01.61.
Full textDuwi Wahyuni, Dhiah Ayu, Tri Legionosuko, and Sutrimo Sumarlan. "Cyber community empowerment policy as an effort to strengthen cyber defense." Strategi Perang Semesta 8, no. 1 (2022): 103. http://dx.doi.org/10.56555/sps.v8i1.1196.
Full textBandyopadhyay, Tridib. "Understanding Optimal Investment in Cyber Terrorism." International Journal of Cyber Warfare and Terrorism 1, no. 2 (2011): 18–34. http://dx.doi.org/10.4018/ijcwt.2011040103.
Full textHaupt, Maria Elisabeth. "Carayannis/Campbell/Efthymiopoulos (eds.) (2014): Cyber-development, cyber-democracy and cyber-defense." Österreichische Zeitschrift für Politikwissenschaft 45, no. 2 (2016): 59. http://dx.doi.org/10.15203/ozp.1323.vol45iss2.
Full textZhang, Yuchen, and Jing Liu. "Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning." Security and Communication Networks 2019 (December 23, 2019): 1–16. http://dx.doi.org/10.1155/2019/3038586.
Full textVenkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.
Full text