Journal articles on the topic 'Cyber defensive'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber defensive.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.
Full textDuvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Full textLachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.
Full textAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Full textSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Full textZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.
Full textVenkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.
Full textZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Full textAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Full textJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Full textPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Full textHuntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Full textAdrian, Dana Austin, Mohammed Tijjani, Shun Chou Te, Dunn Carolyn, and Behm Michael. "A Survey of Social Engineers that did not Collect Enough Data." Engineering and Technology Journal 07, no. 06 (2022): 1270–81. https://doi.org/10.5281/zenodo.6606712.
Full textPoornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Full textSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine." Analytical papers of the Institute of Europe RAS, no. 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Full textMerlino, Jorge C., Mohammed Asiri, and Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids." Sustainability 14, no. 5 (2022): 2730. http://dx.doi.org/10.3390/su14052730.
Full textKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems." International Journal of Engineering and Applied Computer Science 02, no. 01 (2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Full textFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries." INFORMATION AND LAW, no. 1(48) (March 6, 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Full textAmer, Lawrence. "AI in cyber security: A dual perspective on hacker tactics and defensive strategies." Cyber Security: A Peer-Reviewed Journal 8, no. 3 (2025): 198. https://doi.org/10.69554/clxc9075.
Full textGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Full textKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Full textUsman, S. D., S. B. Junaidu, A. A. Obiniyi, and M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward." Scientia Africana 20, no. 3 (2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Full textMerz, Terry, and Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Full textObioha-Val, Onyinye Agatha, Oluwaseun Oladeji Olaniyi, Michael Olayinka Gbadebo, Adebayo Yusuf Balogun, and Anthony Obulor Olisa. "Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign." Asian Journal of Research in Computer Science 18, no. 1 (2025): 184–204. https://doi.org/10.9734/ajrcos/2025/v18i1557.
Full textSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES." Cybersecurity & Cybercrime 1, no. 2 (2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Full textThenjiwe Sithole, Jaco Du Toit, and Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Full textAshok, Bawge, and Joshi Dr.Harish. "A Review on Cybersecurity Issues and Emerging Trends in Modern Technologies." Journal of Sensor Research and Technologies 7, no. 2 (2025): 34–40. https://doi.org/10.5281/zenodo.15560005.
Full textByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson, and Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations." Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Full textLegg, Phil, Alan Mills, and Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Full textKullman, Kaur, Matt Ryan, and Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations." IFAC-PapersOnLine 52, no. 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Full textIlić, Maja. "Cyber security during covid-19 pandemic." Savremene studije bezbednosti, no. 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Full textYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Full textEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, and Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Full textMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law." International Journal of Cyber Warfare and Terrorism 8, no. 1 (2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Full textSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Full textCzosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Full textZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting." Applied and Computational Engineering 38, no. 1 (2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Full textMcCune, Jayson, and Dwight A. Haworth. "Securing America Against Cyber War." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Full textSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment." International Security 41, no. 3 (2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Full textKomaragiri, Sai Gireesh, Sujatha Alla, Teresa Duvall, Saltuk Karahan, Nagesh Bheesetty, and Vijay Kumar Chattu. "A Governance-Centric Framework for Strengthening Healthcare Cybersecurity: A Systems Perspective." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 659–67. https://doi.org/10.34190/iccws.20.1.3374.
Full textJain, Jay Kumar, and Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 32 (February 24, 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Full textLlamas Covarrubias, Jersain Zadamig. "From Prevention to Resilience." Journal of Information Security and Cybercrimes Research 8, no. 1 (2025): 01–16. https://doi.org/10.26735/vvms1897.
Full textDhanaraj, Anandan. "The Evolution of Cyber Threats: From Traditional Attacks to AI-Powered Challenges." European Journal of Computer Science and Information Technology 13, no. 36 (2025): 50–61. https://doi.org/10.37745/ejcsit.2013/vol13n365061.
Full textSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Demonstration and Evaluation of Defensive Cyber Operations Decision-Making Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 628–37. https://doi.org/10.34190/eccws.24.1.3540.
Full textWu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Full textHeryanto, Diky, and Salma Azizah. "APPLICATION OF ACCESS CONTROL LIST FOR NETWORK SECURITY AT CISCO ROUTER AS A FIREWALL." OISAA Journal of Indonesia Emas 2, no. 2 (2019): 71–76. http://dx.doi.org/10.52162/jie.2019.002.02.3.
Full textArmstrong, Miriam E., Keith S. Jones, and Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Full textVeljković, Sanela. "Possibility of applying the rules of international humanitarian law to cyber warfare." Pravo - teorija i praksa 41, no. 3 (2024): 17–28. http://dx.doi.org/10.5937/ptp2403017v.
Full textNejabatkhah, Farzam, Yun Wei Li, Hao Liang, and Rouzbeh Reza Ahrabi. "Cyber-Security of Smart Microgrids: A Survey." Energies 14, no. 1 (2020): 27. http://dx.doi.org/10.3390/en14010027.
Full textAzmi, Nor Nashrah, Fiza Abdul Rahim, Noor Hafizah Hassan, and Nur Azfahani Ahmad. "SWOT ANALYSIS OF CYBERSECURITY VULNERABILITIES AND STRATEGIES IN RENEWABLE ENERGY SYSTEM: A CASE STUDY ON EUROPEAN WIND POWER SYSTEM." Malaysian Journal of Sustainable Environment 12, no. 2 (2025): 103–26. https://doi.org/10.24191/myse.v12i2.7072.
Full text