Journal articles on the topic 'State cyberattacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'State cyberattacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Full textDong, Jiping, Mengmeng Hao, Fangyu Ding, et al. "A Novel Multimodal Data Fusion Framework: Enhancing Prediction and Understanding of Inter-State Cyberattacks." Big Data and Cognitive Computing 9, no. 3 (2025): 63. https://doi.org/10.3390/bdcc9030063.
Full textNizovtsev, Yuriy Yu, Andrii M. Lyseiuk, and Mykhailo Kelman. "From self-affirmation to national security threat." Revista Científica General José María Córdova 20, no. 38 (2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Full textAnnef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA." Sriwijaya Journal of International Relations 1, no. 1 (2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Full textKOLOSOK, Irina N., and Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods." Elektrichestvo 6, no. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Full textKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng, and Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Full textHomam, El-Taj. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications (IJNSA) 15, no. 3 (2023): 85–94. https://doi.org/10.5281/zenodo.8089578.
Full textGórka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Full textLeng, Yaxuan. "When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict." Lecture Notes in Education Psychology and Public Media 17, no. 1 (2023): 201–7. http://dx.doi.org/10.54254/2753-7048/17/20231249.
Full textCostea, Ana Maria, and Mihail Caradaică. "Cyberattacks and the Erosion of State Sovereignty." Analele Universității din Oradea. Seria: Relații Internaționale și Studii Europene XVI (2024): 51–60. https://doi.org/10.58603/adsm6039.
Full textHrushko, M. V. "ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE." Constitutional State, no. 43 (October 26, 2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.
Full textPołeć, Jolanta, and Wojciech Trzaskowski. "The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe." Przegląd Nauk o Obronności, no. 12 (June 20, 2022): 111–30. http://dx.doi.org/10.37055/pno/150838.
Full textNihreieva, Olena. "State responsibility for cyberattacks as a use of force in the context of the 2022 Russian invasion of Ukraine." IDP. Revista de Internet, Derecho y Política, no. 42 (January 7, 2025): 1–13. https://doi.org/10.7238/idp.v0i42.430724.
Full textEichensehr, Kristen E. "Decentralized Cyberattack Attribution." AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Full textAlsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani, and Raed Alsini. "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model." Symmetry 14, no. 7 (2022): 1450. http://dx.doi.org/10.3390/sym14071450.
Full textEl-Taj, Homam. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications 15, no. 03 (2023): 85–94. http://dx.doi.org/10.5121/ijnsa.2023.15306.
Full textKnebel, Sebastian, Mario D. Schultz, and Peter Seele. "Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating." Journal of Information, Communication and Ethics in Society 20, no. 1 (2021): 91–109. http://dx.doi.org/10.1108/jices-01-2021-0015.
Full textAnh, Mac Trang. "International Law Protection in Cyberspace Against Ransomware and Experience of Vietnam." Vietnamese Journal of Legal Sciences 9, no. 2 (2023): 1–26. http://dx.doi.org/10.2478/vjls-2023-0007.
Full textAl-Nawashi, Malek M., Obaida M. Al-hazaimeh, Tahat M. Nedal, Nasr Gharaibeh, Waleed A. Abu-Ain, and Tarik Abu-Ain. "Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 03 (2025): 170–90. https://doi.org/10.3991/ijim.v19i03.50727.
Full textPrajapati, Praveen Kumar. "Cyberattacks Prediction with Machine Learning." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4106–8. https://doi.org/10.22214/ijraset.2025.68992.
Full textVasylenko, Serhii, Igor Samoilov, and Serhii Burian. "Method of control of the state of protection of the automated process control system of the critical infrastructure facility." Collection "Information Technology and Security" 10, no. 1 (2022): 17–26. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261047.
Full textShihab Ahmed, Ahmed. "Development a data mining techniques to detect and prevention cyber attack for cybersecurity." Muthanna Journal of Pure Science 11, no. 1 (2024): 1–27. http://dx.doi.org/10.52113/2/11.01.2024/1-27.
Full textKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Full textSurilova, O. O. "PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES." Constitutional State, no. 43 (October 26, 2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.
Full textPoptchev, Peter. "NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.
Full textVoronko, I. "DIFFERENTIAL-GAME MODEL OF INFORMATION PROTECTION FOR COMPUTER SYSTEMS OF TRANSPORT INFRASTRUCTURE." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 38 (2021): 201–12. http://dx.doi.org/10.32703/2617-9040-2021-38-198-19.
Full textAhmed, Dalia Shihab, Abbas Abdulazeez Abdulhameed, and Methaq T. Gaata. "A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 86–135. http://dx.doi.org/10.58496/mjcs/2024/018.
Full textKolosok, Irina, and Liudmila Gurina. "A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis." E3S Web of Conferences 216 (2020): 01029. http://dx.doi.org/10.1051/e3sconf/202021601029.
Full textKallberg, Jan, and Bhavani Thuraisingham. "State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks." IT Professional 15, no. 3 (2013): 32–35. http://dx.doi.org/10.1109/mitp.2013.20.
Full textLukicheva, I. A., and A. L. Kulikov. "The usage of power system multi-model forecasting aided state estimation for cyber attack detection." Power engineering: research, equipment, technology 23, no. 5 (2022): 13–23. http://dx.doi.org/10.30724/1998-9903-2021-23-5-13-23.
Full textLYSENKO, SERGII, DMYTRO SOKALSKYI, and IIANA MYKHASKO. "METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART." Computer systems and information technologies, no. 3 (April 14, 2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.
Full textA. K. R. S., Anusha. "State of the Art - Cybercrimes and Cyber Security Policies and Countermeasures." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 2744–52. http://dx.doi.org/10.22214/ijraset.2023.57092.
Full textMaltseva, Irina, Yuliya Chernish, and Roman Shtonda. "ANALYSIS OF SOME CYBER THREATS IN WAR." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 37–44. http://dx.doi.org/10.28925/2663-4023.2022.16.3744.
Full textTareq, Imad, Bassant Mohamed Elbagoury, Salsabil Amin El-Regaily, and El-Sayed M. El-Horbaty. "Deep Reinforcement Learning Approach for Cyberattack Detection." International Journal of Online and Biomedical Engineering (iJOE) 20, no. 05 (2024): 15–30. http://dx.doi.org/10.3991/ijoe.v20i05.48229.
Full textPoornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Full textWarchoł, Agnieszka. "Od ofiary do światowego lidera. Estonia po cyberatakach z 2007 roku." Politeja 20, no. 5(86) (2023): 307–27. http://dx.doi.org/10.12797/politeja.20.2023.86.14.
Full textIsmail, Shereen, Diana W. Dawoud, and Hassan Reza. "Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review." Future Internet 15, no. 6 (2023): 200. http://dx.doi.org/10.3390/fi15060200.
Full textPonaganti, MURALI. "ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 2 (2020): 1139–48. http://dx.doi.org/10.61841/turcomat.v11i2.14507.
Full textSigholm, Johan. "Non-State Actors in Cyberspace Operations." Journal of Military Studies 4, no. 1 (2013): 1–37. http://dx.doi.org/10.1515/jms-2016-0184.
Full textMura, Sarybayev, Kaliyeva Yeleukhan, Zhekenov Duman, and Islambek Parkhatzhan. "China's Co-Operation with Central Asian Countries on Cyber Security." Journal of Posthumanism 5, no. 5 (2025): 965–79. https://doi.org/10.63332/joph.v5i5.1415.
Full textMokhor, Volodymyr, Oleksandr Korchenko, Serhii Honchar, Maxsim Komarov, and Alla Onyskova. "Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects." E3S Web of Conferences 280 (2021): 09009. http://dx.doi.org/10.1051/e3sconf/202128009009.
Full textEL-Ebiary, Ahmed H., Mostafa I. Marei, Mahmoud A. Attia, and Mohamed Mokhtar. "A sensorless cyberattacks mitigation technique based on braided lyapunov state observer." Electric Power Systems Research 235 (October 2024): 110881. http://dx.doi.org/10.1016/j.epsr.2024.110881.
Full textТарасевич, Ксения Александровна. "Cyberattack as a Risk Factor During Formation of Business Reputation of a Commercial Legal Entity." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 2 (June 15, 2022): 87–92. http://dx.doi.org/10.26163/gief.2022.68.56.015.
Full textPavel, Tal. "The Iranian Cyberattacks in Albania: Actors, Tactics, Targets." dot.pl, no. I (December 3, 2024): 105–23. https://doi.org/10.60097/dotpl/196772.
Full textVega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids." Applied Sciences 10, no. 7 (2020): 2276. http://dx.doi.org/10.3390/app10072276.
Full textActon, James M. "Cyber Warfare & Inadvertent Escalation." Daedalus 149, no. 2 (2020): 133–49. http://dx.doi.org/10.1162/daed_a_01794.
Full textKhalil, Ahmad, Mohammad Bitar, and S. Anandha Krishna Raj. "A New Era of Armed Conflict: The Role of State and Non-State Actors in Cyber Warfare with Special Reference to Russia-Ukraine War." TalTech Journal of European Studies 14, no. 2 (2024): 49–72. http://dx.doi.org/10.2478/bjes-2024-0016.
Full textMALAKHOVA, Tetiana. "CYBERSECURITY OF PUBLIC ADMINISTRATION BODIES IN THE CONTEXT OF MODERN HYBRID THREATS: INSTITUTIONAL AND TECHNOLOGICAL ASPECTS." Coordinates of Public Administration, no. 1 (June 30, 2025): 379–97. https://doi.org/10.62664/cpa.2025.01.18.
Full textXiao, Hanyu, Hao Wei, Qichen Liao, Qiongwei Ye, Changlin Cao, and Yawen Zhong. "Exploring the gamification of cybersecurity education in higher education institutions: An analytical study." SHS Web of Conferences 166 (2023): 01036. http://dx.doi.org/10.1051/shsconf/202316601036.
Full textMtukushe, Namhla, Adeniyi K. Onaolapo, Anuoluwapo Aluko, and David G. Dorrell. "Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems." Energies 16, no. 13 (2023): 5206. http://dx.doi.org/10.3390/en16135206.
Full text