Academic literature on the topic 'Cyber influence operations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber influence operations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber influence operations"
Van Niekerk, Brett, and Trishana Ramluckan. "Towards Norms for State Responsibilities regarding Online Disinformation and Influence Operations." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 500–509. http://dx.doi.org/10.34190/eccws.22.1.1121.
Full textNeilsen, Rhiannon. "Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities." Ethics & International Affairs 37, no. 2 (2023): 161–76. http://dx.doi.org/10.1017/s0892679423000187.
Full textŠTRUCL, DAMJAN. "RUSSIAN AGGRESSION ON UKRAINE: CYBER OPERATIONS AND THE INFLUENCE OF CYBERSPACE ON MODERN WARFARE." CONTEMPORARY MILITARY CHALLENGES 2022, no. 2 (2022): 103–23. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.24.2.6.
Full textKralovánszky, Kristóf. "Certain Connections between Cyber Operations, Artificial Intelligence and Operational Domains." Hadtudományi Szemle 14, no. 4 (2021): 5–16. http://dx.doi.org/10.32563/hsz.2021.4.1.
Full textMaschmeyer, Lennart. "The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations." International Security 46, no. 2 (2021): 51–90. http://dx.doi.org/10.1162/isec_a_00418.
Full textDivyam, Misser. "AI-Powered Detection and Prevention of Deepfake Deception in Cyber Influence Operations." Journal of Research and Innovation in Technology, Commerce and Management Vol. 2, Issue 5 (2025): 2560–64. https://doi.org/10.5281/zenodo.15423512.
Full textSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Full textSartonen, Miika, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, and Veli-Pekka Kivimäki. "A Framework for the Weapons of Influence." International Journal of Cyber Warfare and Terrorism 10, no. 1 (2020): 34–49. http://dx.doi.org/10.4018/ijcwt.2020010103.
Full textSander, Barrie. "Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections." Chinese Journal of International Law 18, no. 1 (2019): 1–56. http://dx.doi.org/10.1093/chinesejil/jmz003.
Full textTanodomdej, Papawadee. "The Tallinn Manuals and the Making of the International Law on Cyber Operations." Masaryk University Journal of Law and Technology 13, no. 1 (2019): 67–86. http://dx.doi.org/10.5817/mujlt2019-1-4.
Full textBooks on the topic "Cyber influence operations"
Bagge, Daniel. Unmasking Maskirovka: Russia's Cyber Influence Operations. Defense Press, 2019.
Find full textDouzet, Frédérick. Cyber-Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0031.
Full textValeriano, Brandon. How Rival States Employ Cyber Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0002.
Full textBeehner, Lionel, Risa Brooks, and Daniel Maurer, eds. Reconsidering American Civil-Military Relations. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197535493.001.0001.
Full textBook chapters on the topic "Cyber influence operations"
Couretas, Jerry M. "Cyber Influence Operations." In An Introduction to Cyber Analysis and Targeting. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-88559-5_4.
Full textChen, John. "Cyber and influence operations." In Chinese Power and Artificial Intelligence. Routledge, 2022. http://dx.doi.org/10.4324/9781003212980-15.
Full textBaezner, Marie, and Sean Cordey. "Influence operations and other conflict trends." In Cyber Security Politics. Routledge, 2022. http://dx.doi.org/10.4324/9781003110224-3.
Full textMeier, Raphael. "LLM-Aided Social Media Influence Operations." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_11.
Full textMantzana, Vasiliki, Eftichia Georgiou, Anna Gazi, Ilias Gkotsis, Ioannis Chasiotis, and Georgios Eftychidis. "Towards a Global CIs’ Cyber-Physical Security Management and Joint Coordination Approach." In Cyber-Physical Security for Critical Infrastructures Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_11.
Full textLittell, Joe. "The Future of Cyber-Enabled Influence Operations: Emergent Technologies, Disinformation, and the Destruction of Democracy." In The Great Power Competition Volume 3. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04586-8_10.
Full textNandakumar, Girish Sreevatsan, and Jose Padilla. "A Game-Transformation-Based Framework to Understand Initial Conditions and Outcomes in the Context of Cyber-Enabled Influence Operations (CIOs)." In Social, Cultural, and Behavioral Modeling. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61255-9_28.
Full textSokolov, Nikolay, Mullagali Khadiev, Pavel Fedotov, and Eugeny Fedotov. "Numerical Study of the Lubricant Viscosity Grade Influence on Thrust Bearing Operation." In Cyber-Physical Systems Engineering and Control. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33159-6_16.
Full textShi, Caiyu. "Innovation and Influence of Fresh Supply Chain Operation Mode Under COVID-19 Based on Network Data Analysis." In 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1726-3_87.
Full textKilovaty*, Ido. "influence operations in the middle east and the prohibition on intervention." In Cyber War and Cyber Peace. I.B. Tauris, 2022. http://dx.doi.org/10.5040/9780755646036.0008.
Full textConference papers on the topic "Cyber influence operations"
Metenko, Jozef, and Miriam Metenkova. "MANIFESTATIONS OF DIGITAL TRACES AS A PERSONAL AND CRIMINALISTICS OBJECT." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/s02/12.
Full textBrangetto, Pascal, and Matthijs A. Veenendaal. "Influence Cyber Operations: The use of cyberattacks in support of Influence Operations." In 2016 8th International Conference on Cyber Conflict (CyCon). IEEE, 2016. http://dx.doi.org/10.1109/cycon.2016.7529430.
Full textKhalil, Omar Kassem, and Rasha Hasan. "Modeling the Influence of data amount on the response time of CRUD Operations under Oracle." In 2022 International Conference on Cyber Resilience (ICCR). IEEE, 2022. http://dx.doi.org/10.1109/iccr56254.2022.9996041.
Full textChaudhary, Vijay, and Danda Rawat. "On the machine learning for minimizing the negative influence in mobile cyber physical systems." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, edited by Tien Pham. SPIE, 2019. http://dx.doi.org/10.1117/12.2519598.
Full textHassani, Vahid, Naveena Crasta, and António M. Pascoal. "Cyber Security Issues in Navigation Systems of Marine Vessels From a Control Perspective." In ASME 2017 36th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/omae2017-61771.
Full textLi, Jianghai, and Xiaojin Huang. "Cyber Attack Detection of I&C Systems in NPPS Based on Physical Process Data." In 2016 24th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/icone24-60773.
Full textZelinko, Ilona, Vyacheslav Kharchenko, and Konstantin Leontiev. "Cyber Security Assessment of Component Off-the-Shelf Based NPP I&C System Using IMECA Technique." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67120.
Full textAsbjørnslett, Bjørn Egil, Per Olaf Brett, Benjamin Lagemann, and Stein Ove Erikstad. "Educating the Next Generation Marine Systems Design Engineer – The NTNU Perspective." In SNAME 14th International Marine Design Conference. SNAME, 2022. http://dx.doi.org/10.5957/imdc-2022-267.
Full textAlam, Shahzad, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, and Jeremy Bryans. "Safety and security analysis of Connected and Automated Vehicles: A methodology based on Interaction with stakeholders." In 9th International Conference on Human Interaction and Emerging Technologies - Artificial Intelligence and Future Applications. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002948.
Full textSanto, H., K. Y. Chia, C. T. Liong, et al. "Assessing Global Performance of 15 and 22 MW Floating Wind Semi-Submersible (FWSS) Platforms through Cyber-Physical Modelling and Simulation." In Offshore Technology Conference. OTC, 2025. https://doi.org/10.4043/35884-ms.
Full textReports on the topic "Cyber influence operations"
Krill, Jr, and Dennis J. Re-integrating Influence and Cyber Operations. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada544900.
Full textMorkun, Volodymyr, Natalia Morkun, Andrii Pikilnyak, Serhii Semerikov, Oleksandra Serdiuk, and Irina Gaponenko. The Cyber-Physical System for Increasing the Efficiency of the Iron Ore Desliming Process. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4373.
Full text