Journal articles on the topic 'Cyber influence operations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber influence operations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Van Niekerk, Brett, and Trishana Ramluckan. "Towards Norms for State Responsibilities regarding Online Disinformation and Influence Operations." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 500–509. http://dx.doi.org/10.34190/eccws.22.1.1121.
Full textNeilsen, Rhiannon. "Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities." Ethics & International Affairs 37, no. 2 (2023): 161–76. http://dx.doi.org/10.1017/s0892679423000187.
Full textŠTRUCL, DAMJAN. "RUSSIAN AGGRESSION ON UKRAINE: CYBER OPERATIONS AND THE INFLUENCE OF CYBERSPACE ON MODERN WARFARE." CONTEMPORARY MILITARY CHALLENGES 2022, no. 2 (2022): 103–23. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.24.2.6.
Full textKralovánszky, Kristóf. "Certain Connections between Cyber Operations, Artificial Intelligence and Operational Domains." Hadtudományi Szemle 14, no. 4 (2021): 5–16. http://dx.doi.org/10.32563/hsz.2021.4.1.
Full textMaschmeyer, Lennart. "The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations." International Security 46, no. 2 (2021): 51–90. http://dx.doi.org/10.1162/isec_a_00418.
Full textDivyam, Misser. "AI-Powered Detection and Prevention of Deepfake Deception in Cyber Influence Operations." Journal of Research and Innovation in Technology, Commerce and Management Vol. 2, Issue 5 (2025): 2560–64. https://doi.org/10.5281/zenodo.15423512.
Full textSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Full textSartonen, Miika, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, and Veli-Pekka Kivimäki. "A Framework for the Weapons of Influence." International Journal of Cyber Warfare and Terrorism 10, no. 1 (2020): 34–49. http://dx.doi.org/10.4018/ijcwt.2020010103.
Full textSander, Barrie. "Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections." Chinese Journal of International Law 18, no. 1 (2019): 1–56. http://dx.doi.org/10.1093/chinesejil/jmz003.
Full textTanodomdej, Papawadee. "The Tallinn Manuals and the Making of the International Law on Cyber Operations." Masaryk University Journal of Law and Technology 13, no. 1 (2019): 67–86. http://dx.doi.org/10.5817/mujlt2019-1-4.
Full textDanyk, Yuriy, and Chad Briggs. "Modern Cognitive Operations and Hybrid Warfare." Journal of Strategic Security 16, no. 1 (2023): 35–50. http://dx.doi.org/10.5038/1944-0472.16.1.2032.
Full textBaraniuk, Kamil, and Piotr Marszałek. "The potential of Cyber Threat Intelligence analytical frameworks in research on information operations and influence operations." Przegląd Bezpieczeństwa Wewnętrznego 16, no. 31 (2024): 279–320. https://doi.org/10.4467/20801335pbw.24.027.20804.
Full textALEKSEIEVA, O. "Cyber weapons: concept, its manifestations and countermeasures." INFORMATION AND LAW, no. 3(50) (September 4, 2024): 162–69. http://dx.doi.org/10.37750/2616-6798.2024.3(50).311720.
Full textDr. Zeeshan Faisal Khan. "Cyber Warfare and International Security: A New Geopolitical Frontier." Critical Review of Social Sciences Studies 3, no. 2 (2025): 513–27. https://doi.org/10.59075/k9cbhz04.
Full textPiekarska, Aleksandra. "CONTEMPORARY INFLUENCE OPERATIONS IN CYBERSPACE - AN ANALYSIS OF THE PHENOMENON." Cybersecurity & Cybercrime 1, no. 4 (2024): 48–61. http://dx.doi.org/10.5604/01.3001.0054.4297.
Full textWhyte, Christopher. "Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online." European Journal of International Security 5, no. 2 (2020): 195–214. http://dx.doi.org/10.1017/eis.2020.2.
Full textTopor, Lev, and Alexander Tabachnik. "Russian Cyber Information Warfare: International Distribution and Domestic Control." Journal of Advanced Military Studies 12, no. 1 (2021): 112–27. http://dx.doi.org/10.21140/mcuj.20211201005.
Full textJimmy, Fnu. "Assessing the Effects of Cyber Attacks on Financial Markets." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 288–305. http://dx.doi.org/10.60087/jaigs.v6i1.254.
Full textDiao, Zhifeng, and Fanglei Sun. "Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks." Processes 11, no. 3 (2023): 951. http://dx.doi.org/10.3390/pr11030951.
Full textPačková, Miroslava. "Active Measures Concept Deconstruction Through the Lenses of Information Influence." Vojenské rozhledy 33, no. 1 (2024): 40–62. http://dx.doi.org/10.3849/2336-2995.33.2024.01.040-062.
Full textBaloch, Muhammad Umar Farooq. "AI in Modern Warfare: Impacts on Information Operations, Cyber Conflicts, and C2 Systems." SOCIAL PRISM 2, no. 2 (2025): 15–28. https://doi.org/10.69671/socialprism.2.2.2025.39.
Full textDamons, Daphne. "Weaponizing Connectivity: The Role of Social Media and Cyberspace in Modern Subversion." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 857–63. https://doi.org/10.34190/eccws.24.1.3450.
Full textDempsey, Thomas. "Spreading Lies Through the Cyber Domain." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 559–66. http://dx.doi.org/10.34190/eccws.22.1.1082.
Full textMitra, Amit, and Kamran Munir. "Influence of Big Data in managing cyber assets." Built Environment Project and Asset Management 9, no. 4 (2019): 503–14. http://dx.doi.org/10.1108/bepam-07-2018-0098.
Full textBellavista, Paolo, and Carlo Giannelli. "Cyber Physical Sensors and Actuators for Privacy- and Cost-Aware Optimization of User-Generated Content Provisioning." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/396136.
Full textSova, Oleg. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (2022): 25–28. http://dx.doi.org/10.15587/2706-5448.2022.261874.
Full textOleg, Sova. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (2022): 25–28. https://doi.org/10.15587/2706-5448.2022.261874.
Full textNeag, Mihai Marcel. "Physiognomy of Military Operations Answer to Hybrid Threats." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 1 (2018): 163–70. http://dx.doi.org/10.1515/kbo-2018-0024.
Full textRaţiu, Aurelian, and Claudiu-Marius Sălăvăstru. "The Influence of Non-Kinetic Actions on Multi-Domain Operations Command and Control." International conference KNOWLEDGE-BASED ORGANIZATION 30, no. 1 (2024): 1–9. http://dx.doi.org/10.2478/kbo-2024-0021.
Full textØstby, Knut, Kirsi Helkala, and Ole Joachim Aasen. "Educating New Military Leaders to be Robust against Influence Operations: A Case Study." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 348–55. http://dx.doi.org/10.34190/eccws.23.1.2100.
Full textKilani, Yanal. "Cyber-security effect on organizational internal process: mediating role of technological infrastructure." Problems and Perspectives in Management 18, no. 1 (2020): 449–60. http://dx.doi.org/10.21511/ppm.18(1).2020.39.
Full textFausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.
Full textThomas, Misoi K., Dr James Ogalo, and Dr Ben Maake. "The Effects of Cost Implications in the Adoption of Biometric Application Banks in Eldoret Town, Kenya." Indian Journal of Image Processing and Recognition 3, no. 6 (2023): 1–6. http://dx.doi.org/10.54105/ijipr.k1633.103623.
Full textMisoi, K. Thomas. "The Effects of Cost Implications in the Adoption of Biometric Application Banks in Eldoret Town, Kenya." Indian Journal of Image Processing and Recognition (IJIPR) 3, no. 6 (2023): 1–6. https://doi.org/10.54105/ijipr.K1633.103623.
Full textGórka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Full textKOPYLOV, ALEXANDER V., ALEXANDER G. LIKHONOSOV, and NIKOLAY A. CHICHULIN. "SOME UNITED STATES OF AMERICA APPROACHES TO CYBER DETERRENCE." Sociopolitical Sciences 14, no. 5 (2024): 15–23. https://doi.org/10.33693/2223-0092-2024-14-5-15-23.
Full textHendriawan, Arizal, Idris Gautama, Denny Siahaan, and Kurniawan Kurniawan. "Analysis of The Influence of Factors on Maritime Cyber Resilience on Board With Intervening Maritime Cyber Security Awareness." Syntax Literate ; Jurnal Ilmiah Indonesia 10, no. 3 (2025): 2783–94. https://doi.org/10.36418/syntax-literate.v10i3.56311.
Full textOnuh, Ojoh. "A Comparative Analysis of the Influence of Artificial Intelligence Tools in Cybersecurity." International Journal of Recent Research in Mathematics Computer Science and Information Technology 11, no. 2 (2025): 32–52. https://doi.org/10.5281/zenodo.14620636.
Full textSunhurova, Salome. "INTERNATIONAL EXPERIENCE OF STRUGGLING WITH THE POLITICAL VIOLENCE BY MEANS OF INFORMATION WARFARE." Politology bulletin, no. 88 (2022): 202–18. http://dx.doi.org/10.17721/2415-881x.2022.88.202-218.
Full textKalogiannidis, Stavros, Maria Paschalidou, Dimitrios Kalfas, and Fotios Chatzitheodoridis. "Relationship between Cyber Security and Civil Protection in the Greek Reality." Applied Sciences 13, no. 4 (2023): 2607. http://dx.doi.org/10.3390/app13042607.
Full textKaterynchuk, Pavlo. "Protection of Cyberspace as a Component of Ukraine’s Information Security." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 57–70. http://dx.doi.org/10.31861/mediaforum.2018.6.57-70.
Full textPavel, Tal. "The Iranian Cyberattacks in Albania: Actors, Tactics, Targets." dot.pl, no. I (December 3, 2024): 105–23. https://doi.org/10.60097/dotpl/196772.
Full textRaska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change." SIRIUS – Zeitschrift für Strategische Analysen 4, no. 2 (2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.
Full textBELCIU (VASILESCU), Alina-Camelia, and Marius PREDA. "Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors." International Journal of Information Security and Cybercrime 13, no. 2 (2024): 18–32. https://doi.org/10.19107/ijisc.2024.02.02.
Full textNcubukezi, Tabisa. "Determination of the end device risk likelihood using the Bayesian network tools." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 319–31. http://dx.doi.org/10.34190/eccws.22.1.1184.
Full textKrasznay, Csaba. "Hacktivists, Proxy Groups, Cyber Volunteers." Academic and Applied Research in Military and Public Management Science 23, no. 3 (2024): 107–24. https://doi.org/10.32565/aarms.2024.3.6.
Full textMANANTAN, MARK BRYAN. "The People’s Republic of China’s Cyber Coercion: Taiwan, Hong Kong, and the South China Sea." Issues & Studies 56, no. 03 (2020): 2040013. http://dx.doi.org/10.1142/s1013251120400135.
Full textHuskaj, Gazmend, Fredrik Blix, and Stefan Axelsson. "A Theory of Offensive Cyberspace Operations and Its Policy and Strategy Implications." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 214–23. http://dx.doi.org/10.34190/eccws.23.1.2391.
Full textSemenov, Boris Romanovich. "The role of digital technologies in US information operations in the post-Soviet space." Мировая политика, no. 1 (January 2025): 37–47. https://doi.org/10.25136/2409-8671.2025.1.73553.
Full textSabeeruddin, shaik. "The Growing Role of Security Orchestration, Automation and Response (SOAR) in SOC Operations." International Journal of Leading Research Publication 5, no. 12 (2024): 1–6. https://doi.org/10.5281/zenodo.14769600.
Full text