Academic literature on the topic 'Cyber influence operations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber influence operations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber influence operations"

1

Van Niekerk, Brett, and Trishana Ramluckan. "Towards Norms for State Responsibilities regarding Online Disinformation and Influence Operations." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 500–509. http://dx.doi.org/10.34190/eccws.22.1.1121.

Full text
Abstract:
The Internet has provided a global mass communication system, and in particular social media technologies began a social revolution for the public sphere. However, these platforms have been exploited for the purposes of influence operations and disinformation campaigns to hinder or subvert national decision-making processes by affecting the policy makers, voters, or swaying general public opinion. Often this is achieved through manipulative means falling within a grey area of international and constitutional systems. Existing proposed normative frameworks for responsible state behaviour in Cyb
APA, Harvard, Vancouver, ISO, and other styles
2

Neilsen, Rhiannon. "Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities." Ethics & International Affairs 37, no. 2 (2023): 161–76. http://dx.doi.org/10.1017/s0892679423000187.

Full text
Abstract:
AbstractIntelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent atrocities? I suggest that using cyber manipulat
APA, Harvard, Vancouver, ISO, and other styles
3

ŠTRUCL, DAMJAN. "RUSSIAN AGGRESSION ON UKRAINE: CYBER OPERATIONS AND THE INFLUENCE OF CYBERSPACE ON MODERN WARFARE." CONTEMPORARY MILITARY CHALLENGES 2022, no. 2 (2022): 103–23. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.24.2.6.

Full text
Abstract:
Abstract The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number of cyber operations to achieve its politically strategic goals. Despite such debates, the Russo-Ukrainian war represents a new turning point in the global security environment, as many non-state actors have become involved in the conflict and cyberspace has become a tool for implementing sanctions. Thus, the article aims to analyze th
APA, Harvard, Vancouver, ISO, and other styles
4

Kralovánszky, Kristóf. "Certain Connections between Cyber Operations, Artificial Intelligence and Operational Domains." Hadtudományi Szemle 14, no. 4 (2021): 5–16. http://dx.doi.org/10.32563/hsz.2021.4.1.

Full text
Abstract:
The relationship of operational domains with various systems based on artificial intelligence is becoming more profound and more diverse. The ability to influence decision-making mechanisms can pose serious risks that need to be identified and interpreted. Cyberspace is the carrier of artificial intelligence, but the latter as an operational domain has not yet been identified. The goal of this study is to examine certain relationships between cyberspace, artificial intelligence, and operational domains from a state-will enforcement perspective, using mostly qualitative tools, combined with qua
APA, Harvard, Vancouver, ISO, and other styles
5

Maschmeyer, Lennart. "The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations." International Security 46, no. 2 (2021): 51–90. http://dx.doi.org/10.1162/isec_a_00418.

Full text
Abstract:
Abstract Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than for
APA, Harvard, Vancouver, ISO, and other styles
6

Divyam, Misser. "AI-Powered Detection and Prevention of Deepfake Deception in Cyber Influence Operations." Journal of Research and Innovation in Technology, Commerce and Management Vol. 2, Issue 5 (2025): 2560–64. https://doi.org/10.5281/zenodo.15423512.

Full text
Abstract:
The accelerated development of deepfake technology has generated tremendous concern regarding its potential abuse in cyber influence operations. Deepfake-created media, such as doctored videos and fake audio, are increasingly utilized to manipulate audiences, influence public opinion, and propagate disinformation. This study discusses the use of artificial intelligence (AI) to detect and prevent deepfake deception. We offer an extensive review of AI-based deep fake detection techniques, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformer models (fi
APA, Harvard, Vancouver, ISO, and other styles
7

Sarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.

Full text
Abstract:
Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned path because of extensive adversary influence, challenging an already complex decision-making environment. Decision-making models have been extensively studied from perspectives of military operations and business management, but they are not sufficiently researched in the context of cyber. This paper responds to this need by examining the decision-making models of DCO leaders
APA, Harvard, Vancouver, ISO, and other styles
8

Sartonen, Miika, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, and Veli-Pekka Kivimäki. "A Framework for the Weapons of Influence." International Journal of Cyber Warfare and Terrorism 10, no. 1 (2020): 34–49. http://dx.doi.org/10.4018/ijcwt.2020010103.

Full text
Abstract:
The development of communications technology has enabled the internet to become a new theatre of military operations. The influence aspects of military operations in information battlespace, however, are difficult both in theory and in practice, especially concerning international law. As a result, there is a variety of national and organizational solutions of how to divide tasks and responsibilities between authorities. This asymmetry generated by different approaches and rules of conduct provides opportunities for actors with more relaxed interpretation of international law, allowing them to
APA, Harvard, Vancouver, ISO, and other styles
9

Sander, Barrie. "Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections." Chinese Journal of International Law 18, no. 1 (2019): 1–56. http://dx.doi.org/10.1093/chinesejil/jmz003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tanodomdej, Papawadee. "The Tallinn Manuals and the Making of the International Law on Cyber Operations." Masaryk University Journal of Law and Technology 13, no. 1 (2019): 67–86. http://dx.doi.org/10.5817/mujlt2019-1-4.

Full text
Abstract:
The Tallinn Manuals (the Manuals) attempted to clarify how to apply existing international law to cyber operations. Though the Manuals are non-binding instruments, the Group of International Experts claimed that they reflected the lex lata applicable to cyber operations. However, this claim is questionable due to the dominating role of a few Western states in the drafting process and the linked neglect of the practice of “affected states” in cyber operations. This article examines the quality of the Manuals’ drafting process and the composition and impartiality of the experts involved. It focu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber influence operations"

1

Bagge, Daniel. Unmasking Maskirovka: Russia's Cyber Influence Operations. Defense Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Douzet, Frédérick. Cyber-Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0031.

Full text
Abstract:
With the expansion of cyberspace, European armed forces are confronted by new challenges. Cyber threats keep growing more sophisticated, targeted, and powerful. Not only states, but also individuals, political groups, and criminal and terrorist organizations use these rather affordable and widely accessible technologies remotely to conduct operations such as espionage, sabotage, information warfare, or influence. Russian nationalist propaganda has made a powerful comeback on social networks, along with ISIS propaganda. Cyber attacks for neutralization or strategic espionage have increased in w
APA, Harvard, Vancouver, ISO, and other styles
3

Valeriano, Brandon. How Rival States Employ Cyber Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0002.

Full text
Abstract:
The central question of this book is: how do states use cyber strategies to influence their rivals? This chapter introduces a theory of cyber coercion that considers the three main types of cyber strategies: disruption, espionage, and degradation. As a form of covert action, cyber coercion can represent ambiguous signals designed to probe adversary intentions and manage escalation risks. This chapter dissects the core logic of coercion and coercive diplomacy as they apply to cyber operations. After defining coercion and establishing the expected threshold of concessions based on surveying mult
APA, Harvard, Vancouver, ISO, and other styles
4

Beehner, Lionel, Risa Brooks, and Daniel Maurer, eds. Reconsidering American Civil-Military Relations. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197535493.001.0001.

Full text
Abstract:
This book explores contemporary civil-military relations in the United States. Much of the canonical literature on civil-military relations was either written during or references the Cold War, while other major research focuses on the post-Cold War era, or the first decade of the twenty-first century. A great deal has changed since then. This book considers the implications for civil-military relations of many of these changes. Specifically, it focuses on factors such as breakdowns in democratic and civil-military norms and conventions; intensifying partisanship and deepening political divisi
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber influence operations"

1

Couretas, Jerry M. "Cyber Influence Operations." In An Introduction to Cyber Analysis and Targeting. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-88559-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, John. "Cyber and influence operations." In Chinese Power and Artificial Intelligence. Routledge, 2022. http://dx.doi.org/10.4324/9781003212980-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baezner, Marie, and Sean Cordey. "Influence operations and other conflict trends." In Cyber Security Politics. Routledge, 2022. http://dx.doi.org/10.4324/9781003110224-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meier, Raphael. "LLM-Aided Social Media Influence Operations." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_11.

Full text
Abstract:
AbstractSocial media platforms enable largely unrestricted many-to-many communication. In times of crisis, they offer a space for collective sense-making and give rise to new social phenomena (e.g., open-source investigations). However, they also serve as a tool for threat actors to conduct Cyber-enabled Social Influence Operations (CeSIOs) to shape public opinion and interfere in decision-making processes. CeSIOs employ sock puppet accounts to engage authentic users in online communication, exert influence, and subvert online discourse. Large Language Models (LLMs) may further enhance the dec
APA, Harvard, Vancouver, ISO, and other styles
5

Mantzana, Vasiliki, Eftichia Georgiou, Anna Gazi, Ilias Gkotsis, Ioannis Chasiotis, and Georgios Eftychidis. "Towards a Global CIs’ Cyber-Physical Security Management and Joint Coordination Approach." In Cyber-Physical Security for Critical Infrastructures Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_11.

Full text
Abstract:
AbstractCritical Infrastructures (CIs) face numerous cyber-physical threats that can affect citizens’ lives and habits, increase their feeling of insecurity, and influence the seamless services provision. During such incidents, but also in general for the security of CIs several internal and external stakeholders are involved, having different needs and requirements, trying to cooperate, respond and recover. Although CIs security management process is well analyzed in the literature there is a need to set a common ground among different CIs, thus reducing administration/coordination overhead a
APA, Harvard, Vancouver, ISO, and other styles
6

Littell, Joe. "The Future of Cyber-Enabled Influence Operations: Emergent Technologies, Disinformation, and the Destruction of Democracy." In The Great Power Competition Volume 3. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04586-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nandakumar, Girish Sreevatsan, and Jose Padilla. "A Game-Transformation-Based Framework to Understand Initial Conditions and Outcomes in the Context of Cyber-Enabled Influence Operations (CIOs)." In Social, Cultural, and Behavioral Modeling. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61255-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sokolov, Nikolay, Mullagali Khadiev, Pavel Fedotov, and Eugeny Fedotov. "Numerical Study of the Lubricant Viscosity Grade Influence on Thrust Bearing Operation." In Cyber-Physical Systems Engineering and Control. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33159-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shi, Caiyu. "Innovation and Influence of Fresh Supply Chain Operation Mode Under COVID-19 Based on Network Data Analysis." In 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1726-3_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kilovaty*, Ido. "influence operations in the middle east and the prohibition on intervention." In Cyber War and Cyber Peace. I.B. Tauris, 2022. http://dx.doi.org/10.5040/9780755646036.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber influence operations"

1

Metenko, Jozef, and Miriam Metenkova. "MANIFESTATIONS OF DIGITAL TRACES AS A PERSONAL AND CRIMINALISTICS OBJECT." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/s02/12.

Full text
Abstract:
This study analysis object digital traces and their influence on the content of modern Criminalistics and the Privacy of individuals. The broad in context and highlight the purpose both of the objects can by useful for better understanding those partly new phenomena in modern live. Basis of the study is to analyze different aspects of the digital traces, including its creation, collection and use. Very complicated is in actual law regulation to correctly capture the balance between the freedom to use information, especially the Internet, and the necessity of control, which is mainly mediated b
APA, Harvard, Vancouver, ISO, and other styles
2

Brangetto, Pascal, and Matthijs A. Veenendaal. "Influence Cyber Operations: The use of cyberattacks in support of Influence Operations." In 2016 8th International Conference on Cyber Conflict (CyCon). IEEE, 2016. http://dx.doi.org/10.1109/cycon.2016.7529430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khalil, Omar Kassem, and Rasha Hasan. "Modeling the Influence of data amount on the response time of CRUD Operations under Oracle." In 2022 International Conference on Cyber Resilience (ICCR). IEEE, 2022. http://dx.doi.org/10.1109/iccr56254.2022.9996041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chaudhary, Vijay, and Danda Rawat. "On the machine learning for minimizing the negative influence in mobile cyber physical systems." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, edited by Tien Pham. SPIE, 2019. http://dx.doi.org/10.1117/12.2519598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hassani, Vahid, Naveena Crasta, and António M. Pascoal. "Cyber Security Issues in Navigation Systems of Marine Vessels From a Control Perspective." In ASME 2017 36th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/omae2017-61771.

Full text
Abstract:
Autonomous marine vessels are the way forward to revolutionize maritime operations. However, the safety and success of autonomous missions depend critically on the availability of a reliable positioning system and time information generated using global positioning system (GPS) data. GPS data are further used for guidance, navigation, and control (GNC) of vehicles. At a mission planning level GPS data are commonly assumed to be reliable. From this perspective, this article aims to highlight the perils of maritime navigation attacks, showing the need for the enhancement of standards and securit
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jianghai, and Xiaojin Huang. "Cyber Attack Detection of I&C Systems in NPPS Based on Physical Process Data." In 2016 24th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/icone24-60773.

Full text
Abstract:
The cyber security problem is posing new challenges to the current safety analysis of nuclear power plants. Historically, analogue control systems in the absence of interactive communications are immune to cyber-attacks; however, digital control systems with extensive interconnection of reprogrammable components are intensely vulnerable to cyber-attacks which shed light on the significance and urgency of the cyber security. The current cyber security approaches, which merely focus on information networks, have not given multi-faceted considerations to instrumentation and control (I&C) syst
APA, Harvard, Vancouver, ISO, and other styles
7

Zelinko, Ilona, Vyacheslav Kharchenko, and Konstantin Leontiev. "Cyber Security Assessment of Component Off-the-Shelf Based NPP I&C System Using IMECA Technique." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67120.

Full text
Abstract:
Nowadays cyber security assurance is one of the key challenges of safety critical software based NPP I&C (Nuclear Power Plants Instrumentation and Control) systems requirements profiling, development and operation. Any I&C system consists of a set of standard software (SW), hardware (HW) and FPGA components. These components can be selected and combined in different ways to address the particular control and safety assurance related tasks. Some of them are proprietary software (PS) and commercial off-the-shelf (COTS) components developed previously. Application of such components reduc
APA, Harvard, Vancouver, ISO, and other styles
8

Asbjørnslett, Bjørn Egil, Per Olaf Brett, Benjamin Lagemann, and Stein Ove Erikstad. "Educating the Next Generation Marine Systems Design Engineer – The NTNU Perspective." In SNAME 14th International Marine Design Conference. SNAME, 2022. http://dx.doi.org/10.5957/imdc-2022-267.

Full text
Abstract:
At the Norwegian University for Science and Technology (NTNU) in Trondheim we have a long tradition for education Master of Science candidates in naval architecture and marine technology for both the Norwegian and global maritime industry. Currently we graduate approximately 120 MSc candidates each year. Until now, they have typically been employed by the three major export industries in Norway, being shipping and shipbuilding, offshore oil and gas, and fisheries and aquaculture, though increasingly offshore renewable energy has become a major employer. In this paper we will report on how we p
APA, Harvard, Vancouver, ISO, and other styles
9

Alam, Shahzad, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, and Jeremy Bryans. "Safety and security analysis of Connected and Automated Vehicles: A methodology based on Interaction with stakeholders." In 9th International Conference on Human Interaction and Emerging Technologies - Artificial Intelligence and Future Applications. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002948.

Full text
Abstract:
Connected and Automated Vehicles (CAVs) are becoming global phenomena and making their way into our society. With the increase in vehicle system automation and connectivity levels, reliance on technology increases, which reduces the human influence on vehicle dynamic driving tasks. This development significantly transformed the nature of human-vehicle interaction design from control to supervisory control. The final goal of CAVs is to enable driverless rides (SAE L 4 – 5), where various stakeholders (passengers, service providers, and insurers) will interact during the post-development phases
APA, Harvard, Vancouver, ISO, and other styles
10

Santo, H., K. Y. Chia, C. T. Liong, et al. "Assessing Global Performance of 15 and 22 MW Floating Wind Semi-Submersible (FWSS) Platforms through Cyber-Physical Modelling and Simulation." In Offshore Technology Conference. OTC, 2025. https://doi.org/10.4043/35884-ms.

Full text
Abstract:
Abstract The objective of the paper is to present the global performance of large (15 MW or more) Floating Wind Semi-Submersible (FWSS) platforms under combined wind, waves and current loads. FWSS platform is an in-house semi-submersible design with three side columns on pontoons and one center column incorporating enhanced stability with outrigger pontoons, low draft, and large airgap. The paper discusses the efficient use of cyber-physical model tests to arrive at reliable results to demonstrate a scalable FWSS design as the turbine size becomes larger. The assessment is derived from model t
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber influence operations"

1

Krill, Jr, and Dennis J. Re-integrating Influence and Cyber Operations. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada544900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morkun, Volodymyr, Natalia Morkun, Andrii Pikilnyak, Serhii Semerikov, Oleksandra Serdiuk, and Irina Gaponenko. The Cyber-Physical System for Increasing the Efficiency of the Iron Ore Desliming Process. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4373.

Full text
Abstract:
It is proposed to carry out the spatial effect of high-energy ultrasound dynamic effects with controlled characteristics on the solid phase particles of the ore pulp in the deslimer input product to increase the efficiency of thickening and desliming processes of iron ore beneficiation products. The above allows predicting the characteristics of particle gravitational sedimentation based on an assessment of the spatial dynamics of pulp solid- phase particles under the controlled action of high-energy ultrasound and fuzzy logical inference. The object of study is the assessment of the character
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!