Academic literature on the topic 'Non-traditional security threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Non-traditional security threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Non-traditional security threats"

1

Syed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.

Full text
Abstract:
Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security
APA, Harvard, Vancouver, ISO, and other styles
2

Basavarajeshwari Halu et al.,, Basavarajeshwari Halu et al ,. "Non-Traditional Security Threats in South Asia." International Journal of Political Science, Law and International Relations 10, no. 2 (2020): 23–30. http://dx.doi.org/10.24247/ijpslirdec20203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumara, Jeewaka Saman. "Non-traditional Security Disputes of Sri Lanka." International Journal for Innovation Education and Research 3, no. 3 (2015): 1–14. http://dx.doi.org/10.31686/ijier.vol3.iss3.323.

Full text
Abstract:
From the 1970s onwards, social constructivists criticized the intense narrowing of the field of security studies imposed by the military and nuclear obsessions of the Cold War. Further, they argued that these traditional issues have not disappeared, but that other, non-military sources of threat now seemed more pressing. Hence, the nature and magnitude of security within the states should be considered from different angles such as economic security, food security, health security, environmental security, personal security, community security and political security. In the context of small sta
APA, Harvard, Vancouver, ISO, and other styles
4

Sen, Kaushik. "Book Review: India and ASEAN : Non-Traditional Security Threats." Jadavpur Journal of International Relations 11-12, no. 1 (2008): 427–31. http://dx.doi.org/10.1177/0973598408110029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biswas, Subrata. "Drug Abuse and Drug Trafficking: Non-Traditional Security Threats in Post-Soviet Central Asia." Asian Journal of Legal Education 8, no. 2 (2021): 247–58. http://dx.doi.org/10.1177/23220058211025964.

Full text
Abstract:
The post-cold war world has become susceptible to multiple non-traditional security threats that are no less formidable than the traditional security threats. Drug trafficking poses one such serious non-traditional security threat and drug abuse provides its fuel. Not only do the drugs destroy the very fabric of human resource in a region where trafficking operates and thereby reduces communities to hollow card-boxes, but such trafficking also generates loads of dirty money which fosters the growth of non-State actors engaged in subversive activities. This article argues that following the fal
APA, Harvard, Vancouver, ISO, and other styles
6

Chatterjee, Aditi. "Non-traditional Maritime Security Threats in the Indian Ocean Region." Maritime Affairs: Journal of the National Maritime Foundation of India 10, no. 2 (2014): 77–95. http://dx.doi.org/10.1080/09733159.2014.972669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mladenov, Vasily Ivanovich, Sergey Viktorovich Kononov, Yulia Victorovna Gavrilova, and Ilona Valerievna Romanova. "Problematization of religious threats in the modern social discourse of Western countries and Russia." LAPLAGE EM REVISTA 7, Extra-B (2021): 193–202. http://dx.doi.org/10.24115/s2446-622020217extra-b911p.193-202.

Full text
Abstract:
The research objective is a comparative analysis of the problems of religious threats in modern social security discourse in Western countries and Russia. The methodological basis of the study is the phenomenological approach used in the process of explaining the meanings arising in the interaction of religion and society and the comparative approach aimed at analyzing the impact on the consciousness of believers in traditional and non-traditional religions. The result of the study is proof of the provision that the content of modern social discourse on the religious threat in the West is unde
APA, Harvard, Vancouver, ISO, and other styles
8

Fusiek, Dawid Aristotelis. "Rethinking Security: The Limits of the Traditional Concept of Security in a World of Non-Traditional Threats." HAPSc Policy Briefs Series 1, no. 2 (2020): 265. http://dx.doi.org/10.12681/hapscpbs.26500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CUONG, Nguyen Xuan, and Nguyen Thi Phuong HOA. "Non-Traditional Security Issues across Vietnam and China Land Borders." East Asian Policy 10, no. 02 (2018): 109–22. http://dx.doi.org/10.1142/s1793930518000223.

Full text
Abstract:
Cultural and social similarities and the sharing of thousands of kilometres of a borderline with many international and national border gates, among others, have boosted Vietnam-China and non-traditional security problems. These problems, arising and accumulating in the development process, are worsening and require increasingly urgent solutions. These issues have become complicated and uncontrollable, posing threats to the socioeconomic security of border regions of the two countries, especially Vietnam.
APA, Harvard, Vancouver, ISO, and other styles
10

Krishnan, Tharishini, Abu Sadat Mahmud Safeer, and Inderjit Singh. "The Growing Power Struggle in Indian Ocean Region: Security Road Map for Bangladesh." JOURNAL OF SOCIAL SCIENCE RESEARCH 14 (October 28, 2019): 3372–79. http://dx.doi.org/10.24297/jssr.v14i0.8470.

Full text
Abstract:
The Indian Ocean Region (IOR) is rising significantly as the center stage for world politics in the current century. Due to the geostrategic and economic importance, the region has created conflicts in strategic interest leading to power confrontation among regional and extra-regional powers resulting in security threats for small littorals like Bangladesh. Some of the threats are influential attachments of the powerful states in foreign, trade, economy and defense sectors, poor regional security architecture and an increase of non-traditional security threats. Analyzing the issues reveals tha
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Non-traditional security threats"

1

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Full text
Abstract:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study i
APA, Harvard, Vancouver, ISO, and other styles
2

Kettil, Daniel. "From National Defence to International Operations? : A study on the transformation of Sweden's armed forces between 1989-2009." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21908.

Full text
Abstract:
Since the cold war, most countries have moved on from the classical security perception that all threats are external and aiming to invade the sovereignty of the state, thus leading to military armies fighting each other. Instead as Globalization have become more predominant since the beginning of the 1990’s new threats have also emerged that militaries can’t fight as they used to, thus it has become necessary for a wider view on security which also involves human suffering, and the general trend among armies have been to combat these through international peacekeeping and humanitarian operati
APA, Harvard, Vancouver, ISO, and other styles
3

Piletti, Felipe José. "Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/14386.

Full text
Abstract:
As grandes guerras da Idade Moderna foram, em sua maioria, travadas por inimigos que se organizavam sob a forma de Estado-nação. Após o final da Guerra Fria, entretanto, um conjunto múltiplo e disperso de fenômenos e atores, predominantemente não-estatais e transnacionais, tem se tornado um importante alvo das políticas de segurança internacional, especialmente as dos Estados do Ocidente. Esses novos fenômenos e atores de caráter nãotradicional são definidos na política de defesa dos EUA – bem como na daqueles Estados, setores e organismos internacionais por ela influenciados – como as “novas
APA, Harvard, Vancouver, ISO, and other styles
4

Fukumi, Sayaka. "A non-traditional security threat : contending EU and US approaches to cocaine trafficking from the Andes." Thesis, University of Nottingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sciascia, Alban. ""Gotong royong" : la coopération sécuritaire américano-indonésienne depuis 2001. Analyse d'un partenariat stratégique en devenir par le prisme de la sécurité maritime." Thesis, Lyon, École normale supérieure, 2012. http://www.theses.fr/2012ENSL0763.

Full text
Abstract:
Au cours de cette étude, nous avons cherché à déterminer l’implication de Washington dans la sécurité de l’Indonésie. Nous nous sommes demandé comment les États-Unis pouvaient revenir dans le jeu politico-sécuritaire indonésien par le biais d’une cause devenue commune, la sécurité maritime. Après avoir examiné l’historique de la relation de l’Indonésie avec l’élément maritime et l’émergence de menaces liées au domaine maritime, nous avons conclu que la sécurisation du domaine maritime apparaît alors comme un leitmotiv sécuritaire commun pour Washington et Jakarta. Confrontée aux errements de l
APA, Harvard, Vancouver, ISO, and other styles
6

華書賢. "Cross-Strait interactions and Non-Traditional Security Threats to Taiwan:The SARS Case." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6y8vcj.

Full text
Abstract:
碩士<br>中央警察大學<br>公共安全研究所<br>106<br>Under the impetus of science and technology and economic development, the two sides of the strait have brought about many conveniences and affluence in human life but have caused changes in the security situation between the two sides of the Taiwan Strait. The focus of the security issue is not limited to the state but also from Individual expansion to the entire human social level. Low-level political issues such as environmental damage, population problems, infectious diseases, social order, economic development, political stability and food security have al
APA, Harvard, Vancouver, ISO, and other styles
7

李嘉峻. "The new Internet era of non-traditional security threats - A study of e-commerce fraud." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/75xfe4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

You, Shao-Yu, and 游邵予. "A Study of Measures of the Taiwan Customs Authorities toward the Non-Traditional Security Threats." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/x4t22j.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>海洋法律研究所<br>102<br>Abstract Under the trend of globalization, trade security and facilitation have long become the goals for every country in international trade. After the terrorist attacks of September 11, 2001 in New York, the U.S. not only has put great efforts into anti-terrorism to guarantee its own security , but also work very hard to make a close coordination between the safeguarding of the security of international trade and the efforts of counter-terrorism in the international community How to make sure that the transportation of merchandise in international trade
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Jia-Li, and 吳嘉立. "The ‎Response of ROC’s Chemical Troops to Non-Traditional Security Threats :Case of Taichung Science Park." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/8xa494.

Full text
Abstract:
碩士<br>國防大學<br>戰略研究所<br>104<br>Non-traditional security includes various threats that are caused by natural and artificial factors. Government has been established related emergency response mechanism, however, there is no department with sufficient specialists and well-found equipment can execute these kinds of specialized disaster rescue mission. Once the toxic chemical substances are leaked will cause severe damage. This essay is set one of the Central Taiwan Science Park, Taichung Science Park, as a base and considered from three aspects which are “Environmental Analysis and Contingency Rea
APA, Harvard, Vancouver, ISO, and other styles
10

HSUAN-LUN, KUO, and 郭宣綸. "The Total–Defense Mechanism under Non-traditional Security Threats: A Case Study of the Military Training Instructor System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ffukd9.

Full text
Abstract:
碩士<br>國防大學政治作戰學院<br>政治研究所<br>107<br>At the end of the twentieth century, the confrontations between two superpowers, the United States and the Soviet Union, and the cold war finally ended. The traditional national security threat has been greatly reduced due to the small chance of a large-scale war. But what followed was a non-traditional security threat that could be defined as challenges to the survival and well-being of peoples and states that arise primarily out of nonmilitary sources. In the coming era of globalization, the more interdependent we are, the more risk society we will become.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Non-traditional security threats"

1

South Asia: Traditional and non-traditional security threats. Pentagon Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

India. Ministry of Defence. Integrated Defence Staff and Observer Research Foundation, eds. Navigating the near: Non-traditional security threats to India, 2022. Observer Research Foundation, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mustafa, Aydın, ed. Non-traditional security threats and regional cooperation in the Southern Caucasus. IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

R, Raghavan V., Centre for Security Analysis (Madras, India), and Hanns-Seidel-Stiftung, eds. India and ASEAN: Non-traditional security threats. EastWest Books (Madras), 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Traditional and non-traditional threats to Central Asian security. KW Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

(Editor), Jim Hanson, and Susan McNish (Editor), eds. Canada and the World: Non-Traditional Security Threats. Diane Pub Co, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bolt, Paul J., and Sharyl N. Cross. Emerging Non-traditional Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198719519.003.0005.

Full text
Abstract:
Chapter 5 focuses on three emerging non-traditional security challenges identified as critical concerns or “main threats” for both Russia and China: color revolutions, cyber and information security, and terrorism and violent extremism. There is a high degree of coincidence between Russian and Chinese perspectives on these issues, recognizing the vulnerabilities that each presents for state security. Russia and China oppose color revolutions, strongly argue that authoritarian regimes have full international legitimacy, and resist attempts to undermine sovereignty in promoting democratization o
APA, Harvard, Vancouver, ISO, and other styles
8

Jones, Lee, and Shahar Hameiri. Governing Borderless Threats: Non-Traditional Security and the Politics of State Transformation. University of Cambridge ESOL Examinations, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jones, Lee, and Shahar Hameiri. Governing Borderless Threats: Non-Traditional Security and the Politics of State Transformation. University of Cambridge ESOL Examinations, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1938-, Hanson Jim, McNish Susan, and Canadian Institute of Strategic Studies., eds. Canadian strategic forecast 1997: Canada and the world : non-traditional security threats. Canadian Institute of Strategic Studies, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Non-traditional security threats"

1

Titovich, Adam, and Vadim Atnashev. "Development Trends of the Strait of Malacca Countries in the Field of Countering Non-traditional Threats to National Security in the Context of the Indo-Pacific Region in 2010s–2020s." In Springer Geography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78690-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Torcetti, Shelley. "Human insecurity and non-traditional threats to security." In Living in the Shadows of China’s HIV/AIDS Epidemics. Routledge, 2019. http://dx.doi.org/10.4324/9780429265488-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vaseashta, Ashok, Sherri B. Vaseashta, and Eric W. Braman. "Mitigating Unconventional Cyber-Warfare." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch071.

Full text
Abstract:
Advances in S&amp;T coupled with universal access to cyberspace have motivated both state and non-state sponsored actors to new levels in the development of novel and non-traditional modes of attack to coerce, disrupt, or overthrow competing groups, regimes, and governments using unconventional warfare strategies. Threat vectors, caused directly or indirectly are asymmetric, kinetic, and unconventional. Current national and defense strategies in Cyberspace are mostly reactive and defensive, rather than pro-active and offensive. The web-crawlers research innovative ways to target security breaches. Securing critical infrastructure requires a top tier protection. This chapter is focused on ways to understand and combat unconventional warfare in cyber-space from CIS standpoint. This is crucial in avoiding a potential Cyber 9/11. To provide accurate intelligence, surveillance, preparedness and interdiction of such combative postures, ongoing studies of the ways that advance S&amp;T may be employed so as to remain aware, alert and proactive for any/all such contingencies of use, are advocated.
APA, Harvard, Vancouver, ISO, and other styles
4

Emerson, Stephen, and Hussein Solomon. "Understanding the security environment." In African security in the twenty-first century. Manchester University Press, 2018. http://dx.doi.org/10.7228/manchester/9781526122735.003.0001.

Full text
Abstract:
This chapter provides the reader with background material and a basic understanding of Africa’s uniqueness. It looks at the highly diverse and unique set of security challenges--from traditional to non-traditional—facing the continent and provides an overview of the nature of the threat to the continent and its people. It also sets the stage for an in-depth examination of the key threats to African security (and by extension to the global community) and identifies some emerging trends that present both opportunities and challenges for improving security in the decades ahead.
APA, Harvard, Vancouver, ISO, and other styles
5

"Maritime security in the Indian Ocean: confronting non-traditional security threats with regional cooperation." In Indian Ocean and Maritime Security. Routledge India, 2016. http://dx.doi.org/10.4324/9781315439761-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Parcon, RJ Marco Lorenzo C., and Julio S. Amador. "Preventive Diplomacy and Non-Traditional Security Threats: Natural Disasters and the Philippines." In Series on Asian Regional Cooperation Studies. WORLD SCIENTIFIC, 2020. http://dx.doi.org/10.1142/9789811218576_0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"4. Strategic Responses to Non-traditional Security Threats: The Role of the Military." In Climate Change and the Bay of Bengal. ISEAS Publishing, 2015. http://dx.doi.org/10.1355/9789814517935-005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"1. Introduction: What is Security Studies?" In Contemporary Security Studies, edited by Alan Collins. Oxford University Press, 2018. http://dx.doi.org/10.1093/hepl/9780198804109.003.0001.

Full text
Abstract:
This text provides an introduction to Security Studies, the sub-discipline of International Relations that deals with the study of security. War and the threat to use force are part of the security equation, but the prevalence of threats is far-reaching for Security Studies. They encompass dangers ranging from pandemic and environmental degradation to terrorism and inter-state armed conflict. The latter is actually a sub-field of Security Studies and is known as Strategic Studies. This edition examines differing approaches to the study of security such as realism, liberalism, social constructivism, and postcolonialism. It also investigates the deepening and broadening of security to include military security, regime security, societal security, environmental security, and economic security. Finally, it discusses a range of traditional and non-traditional issues that have emerged on the security agenda, including weapons of mass destruction, terrorism, energy security, and health.
APA, Harvard, Vancouver, ISO, and other styles
9

Collins, Alan. "1. Introduction:." In Contemporary Security Studies. Oxford University Press, 2015. http://dx.doi.org/10.1093/hepl/9780198708315.003.0001.

Full text
Abstract:
This text provides an introduction to Security Studies, the sub-discipline of International Relations that deals with the study of security. War and the threat to use force are part of the security equation, but the prevalence of threats is far-reaching for Security Studies. They encompass dangers ranging from pandemic and environmental degradation to terrorism and inter-state armed conflict. The latter is actually a sub-field of Security Studies and is known as Strategic Studies. This edition examines differing approaches to the study of security such as realism, liberalism, social constructivism, and postcolonialism. It also investigates the deepening and broadening of security to include military security, regime security, societal security, environmental security, and economic security. Finally, it discusses a range of traditional and non-traditional issues that have emerged on the security agenda, including weapons of mass destruction, terrorism, energy security, and health.
APA, Harvard, Vancouver, ISO, and other styles
10

Markos, Karavias. "Part II Predominant Security Challenges and International Law, Human Security, Ch.24 States and Non-State Actors and Human Security." In The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0025.

Full text
Abstract:
This chapter examines the role of States and non-State actors in guaranteeing human security. ‘Human security’ as a concept may be seen as methodologically over-inclusive. After all, threats to collective or international security, such as inter-State use of military force, necessarily imperil the security of individuals. For the purposes of the chapter, threats to ‘human security’ are understood as threats to the fundamental human rights of individuals. It is posited that international practice has recognized the interlinking—and potential causal—pathways between gross violations of human rights and threats to international peace. The chapter discusses the traditional dual role of States, as violators and guarantors of human rights. Security offered by States to individuals within their territory is crucial in terms of attaining security at an international level. Indeed, lack of security within the boundaries of a State can have debilitating effects on regional or international peace. The chapter then assesses whether non-State actors can assume a corresponding dual role, looking into the role of multinational enterprises, de facto regimes, and clans through the lens of international human rights and refugee law. Finally, it reframes the category of ‘non-State actors’ more generally and posits that these actors may not be all that detached or different from States in the first place.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Non-traditional security threats"

1

Xiong, Liang, Weiwei Wang, Huansong Liu, Xin Xu, and Chang Liu. "An Analysis of Major Non-traditional Security Threats Currently Faced in Xinjiang." In 2016 International Conference on Economics, Social Science, Arts, Education and Management Engineering. Atlantis Press, 2016. http://dx.doi.org/10.2991/essaeme-16.2016.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiong, Liang, Weiwei Wang, Silan Li, and Xin Xu. "The Quality Chain Management: A Framework for the Prevention and Countermeasures against Non-traditional Security Threats in Xinjiang." In 2nd International Symposium on Social Science 2016 (ISSS 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/isss-16.2016.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xiong, Liang, Weiwei Wang, Silan Li, and Xin Xu. "The Status Quo and Development of Study on the Prevention and Countermeasures against the Non-traditional Security Threats in Xinjiang." In 2016 5th International Conference on Social Science, Education and Humanities Research. Atlantis Press, 2016. http://dx.doi.org/10.2991/ssehr-16.2016.217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Weiwei, Liang Xiong, Huansong Liu, Xin Xu, and Chang Liu. "Research on the Application of Evidence-based Thought in the Prevention and Response to Non-traditional Security Threats in Xinjiang." In 2nd International Symposium on Social Science 2016 (ISSS 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/isss-16.2016.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tam, K., K. Forshaw, and KD Jones. "Cyber-SHIP: Developing Next Generation Maritime Cyber Research Capabilities." In International Conference on Marine Engineering and Technology Oman. IMarEST, 2019. http://dx.doi.org/10.24868/icmet.oman.2019.005.

Full text
Abstract:
As a growing global threat, cyber-attacks can cost millions of dollars or endanger national stability and human lives. While relatively well understood in most sectors, it is becoming clear that, although the maritime sector is becoming more digitally advanced (e.g., autonomy), it is not well protected against cyber or cyber-physical attacks and accidents. To help improve sector-wide safety and resiliency, the University of Plymouth (UoP) is creating a specialised maritime-cyber lab, which combines maritime technology and traditional cyber-security labs. This is in response to the lack of rese
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!