To see the other types of publications on this topic, follow the link: State cyberattacks.

Journal articles on the topic 'State cyberattacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'State cyberattacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.

Full text
Abstract:
Over the years cybersecurity threats to and cyberattacks on the critical infrastructure by state and non-state actors have escalated in intensity and sophistication. Cyberattacks, such as the 2017 NotPetya ransomware attack, the 2020 SolarWinds software supply chain attack and the 2021 Colonial Pipeline ransomware attack, illustrate the vulnerability of critical infrastructure to cyberattacks.
 
 Most cyberattacks are committed across borders involving criminal hackers or state supported hackers. Furthermore, critical infrastructure is increasingly interconnected and interdependent.
APA, Harvard, Vancouver, ISO, and other styles
2

Dong, Jiping, Mengmeng Hao, Fangyu Ding, et al. "A Novel Multimodal Data Fusion Framework: Enhancing Prediction and Understanding of Inter-State Cyberattacks." Big Data and Cognitive Computing 9, no. 3 (2025): 63. https://doi.org/10.3390/bdcc9030063.

Full text
Abstract:
Inter-state cyberattacks are increasingly becoming a major hidden threat to national security and global order. However, current prediction models are often constrained by single-source data due to insufficient consideration of complex influencing factors, resulting in limitations in understanding and predicting cyberattacks. To address this issue, we comprehensively consider multiple data sources including cyberattacks, bilateral interactions, armed conflicts, international trade, and national attributes, and propose an interpretable multimodal data fusion framework for predicting cyberattack
APA, Harvard, Vancouver, ISO, and other styles
3

Nizovtsev, Yuriy Yu, Andrii M. Lyseiuk, and Mykhailo Kelman. "From self-affirmation to national security threat." Revista Científica General José María Córdova 20, no. 38 (2022): 355–70. http://dx.doi.org/10.21830/19006586.905.

Full text
Abstract:
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon
APA, Harvard, Vancouver, ISO, and other styles
4

Annef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA." Sriwijaya Journal of International Relations 1, no. 1 (2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.

Full text
Abstract:
Several policies made by country during pandemic related to restriction and prohibition of public mobility implicated to cyberspace activities. Internet Users in Indonesia increased significantly by 17% in 2020 compared to 2019. Internet Users escalation during pandemic reciprocal with the rise of cyberattacks. By using qualitative methods, this paper aims to explain the phenomenon using two approaches, non-traditional security and cybersecurity. The author's findings show that cyberattacks in Indonesia elevated by 5 times in 2020. Some of these cyberattacks include phishing emails, ransomware
APA, Harvard, Vancouver, ISO, and other styles
5

KOLOSOK, Irina N., and Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods." Elektrichestvo 6, no. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.

Full text
Abstract:
The hardware and software tools of the data acquisition and processing systems, as well as the state estimation procedure intended to support the actions of dispatching personnel in performing operational and emergency control of electric power systems (EPS), are critically important components of the EPS information and communication subsystem, but at the same time, they are most vulnerable to cyberattacks. To reduce the extent to which cyberattacks can affect the control quality, it is proposed to use statistical methods for processing measurement information. First of all, these are static
APA, Harvard, Vancouver, ISO, and other styles
6

Khattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng, and Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.

Full text
Abstract:
Active traffic management (ATM) systems have been introduced by transportation agencies to manage recurrent and non-recurrent congestion. ATM systems rely on the interconnectivity of components made possible by wired and/or wireless networks. Unfortunately, this connectivity that supports ATM systems also provides potential system access points that results in vulnerability to cyberattacks. This is becoming more pronounced as ATM systems begin to integrate Internet of Things (IoT) devices. Hence, there is a need to rigorously evaluate ATM systems for cyberattack vulnerabilities, and explore de
APA, Harvard, Vancouver, ISO, and other styles
7

Homam, El-Taj. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications (IJNSA) 15, no. 3 (2023): 85–94. https://doi.org/10.5281/zenodo.8089578.

Full text
Abstract:
Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks being reported since 2020. These cyberattacks significantly threaten the country's national security, economic stability, and personal privacy. In this article, we will explore the types of cyberattacks that have been observed in Saudi Arabia after 2020, the impact they have had on the country, and the measures taken by the Saudi government to counter these attacks. This article is aimed at providing a comprehensive understanding of the current state of cyberattacks in Saudi Arabia and the m
APA, Harvard, Vancouver, ISO, and other styles
8

Górka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.

Full text
Abstract:
Abstract The article deals with cyber incidents that were recorded in the area of the V4 countries. It is important for the discussed topic to extract certain factors and with their help to characterise the conducted cyberattacks in terms of political motivations. The analysis tries to prove the existence of politically motivated cyberattacks. This, in turn, helps to determine the consequences of such cyber incidents. Moreover, the scale and magnitude of the cyberattack can be information to determine the strategic maturity and cyber capabilities of the adversary. Thus, the incidents that have
APA, Harvard, Vancouver, ISO, and other styles
9

Leng, Yaxuan. "When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict." Lecture Notes in Education Psychology and Public Media 17, no. 1 (2023): 201–7. http://dx.doi.org/10.54254/2753-7048/17/20231249.

Full text
Abstract:
In todays international community, cyberattacks occur frequently, and cyberspace has become an important battlefield for political games among major powers. Under the push of cyberattacks, the tension between Russia and Ukraine has further escalated. However, due to the unique nature of cyberspace, the rules under the existing international law are difficult to directly apply to the field of cyberspace. This has allowed states and non-state actors to willfully disrupt the network systems and other infrastructure of other countries, causing damage to people or property. One major issue is when
APA, Harvard, Vancouver, ISO, and other styles
10

Costea, Ana Maria, and Mihail Caradaică. "Cyberattacks and the Erosion of State Sovereignty." Analele Universității din Oradea. Seria: Relații Internaționale și Studii Europene XVI (2024): 51–60. https://doi.org/10.58603/adsm6039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hrushko, M. V. "ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE." Constitutional State, no. 43 (October 26, 2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.

Full text
Abstract:
Growing impunity in cyberspace is cause by the lack of responsibility for the most serious cyberoperations that present a threat to both state and non-state actors. The only possible solution is to trace such cyberoperations to those who stand behind them. Since the seriousness of consequences increases in case of state-committed cyberattacks, the article deals with the issue of attribution of cyberattacks to states with the aim of ensuring responsible behavior of all states in cyberspace. The existing practice of public attribution and features of cyberoperations, as a rule, requires not only
APA, Harvard, Vancouver, ISO, and other styles
12

Połeć, Jolanta, and Wojciech Trzaskowski. "The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe." Przegląd Nauk o Obronności, no. 12 (June 20, 2022): 111–30. http://dx.doi.org/10.37055/pno/150838.

Full text
Abstract:
ObjectivesThe purpose of this article is to investigate and present the issue of cyberwar and its impact on the socio-economic activity of inhabitants of Central and Eastern Europe.MethodsThe main method used in this study is a systematic review of international and Polish political literature in the fields of cybersecurity, sociology, military, international relations and international politics.ResultsThe analysis enabled identifying the importance of the cyberspace driven by the technological development. Article discusses key terms, the concept of cyberwar, categorization of cyberattacks an
APA, Harvard, Vancouver, ISO, and other styles
13

Nihreieva, Olena. "State responsibility for cyberattacks as a use of force in the context of the 2022 Russian invasion of Ukraine." IDP. Revista de Internet, Derecho y Política, no. 42 (January 7, 2025): 1–13. https://doi.org/10.7238/idp.v0i42.430724.

Full text
Abstract:
The article offers a legal analysis of cyberattacks occurring in the context of the ongoing Russian invasion of Ukraine. Various approaches to their consideration in terms of the use of force are explored in the study. The necessity of an interdisciplinary approach is emphasized, as integrating computer science and legal studies is essential for establishing precise criteria for an effective legal framework. While a consensus on highly destructive cyberattacks has emerged, an international legal framework for less destructive cyber operations still needs to be developed. Particular attention i
APA, Harvard, Vancouver, ISO, and other styles
14

Eichensehr, Kristen E. "Decentralized Cyberattack Attribution." AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.

Full text
Abstract:
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in attributions in recent years shows that attribution is far from impossible. After several years of only sporadic attributions, Western governments in 2017 began attributing cyberattacks to other governments more frequently and in a more coordinated fashion. But nongovernment actors have more consistently attributed harmful cyber activity to state actors. Although not without risks, these nongovernmental attributions play an important role in the cybersecurity ecosystem. They are often faster and more de
APA, Harvard, Vancouver, ISO, and other styles
15

Alsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani, and Raed Alsini. "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model." Symmetry 14, no. 7 (2022): 1450. http://dx.doi.org/10.3390/sym14071450.

Full text
Abstract:
Technological advancement has transformed traditional vehicles into autonomous vehicles. Autonomous vehicles play an important role since they are considered an essential component of smart cities. The autonomous vehicle is an intelligent vehicle capable of maintaining safe driving by avoiding crashes caused by drivers. Unlike traditional vehicles, which are fully controlled and operated by humans, autonomous vehicles collect information about the outside environment using sensors to ensure safe navigation. Autonomous vehicles reduce environmental impact because they usually use electricity to
APA, Harvard, Vancouver, ISO, and other styles
16

El-Taj, Homam. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications 15, no. 03 (2023): 85–94. http://dx.doi.org/10.5121/ijnsa.2023.15306.

Full text
Abstract:
Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks being reported since 2020. These cyberattacks significantly threaten the country's national security, economic stability, and personal privacy. In this article, we will explore the types of cyberattacks that have been observed in Saudi Arabia after 2020, the impact they have had on the country, and the measures taken by the Saudi government to counter these attacks. This article is aimed at providing a comprehensive understanding of the current state of cyberattacks in Saudi Arabia and the measu
APA, Harvard, Vancouver, ISO, and other styles
17

Knebel, Sebastian, Mario D. Schultz, and Peter Seele. "Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating." Journal of Information, Communication and Ethics in Society 20, no. 1 (2021): 91–109. http://dx.doi.org/10.1108/jices-01-2021-0015.

Full text
Abstract:
Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization (CCO) theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection (PDCS) of ransomwar
APA, Harvard, Vancouver, ISO, and other styles
18

Anh, Mac Trang. "International Law Protection in Cyberspace Against Ransomware and Experience of Vietnam." Vietnamese Journal of Legal Sciences 9, no. 2 (2023): 1–26. http://dx.doi.org/10.2478/vjls-2023-0007.

Full text
Abstract:
Abstract Amongst various cyberattacks, ransomware adversely affects the business operation as the malware locks the computer or data, and menaces to keep it locked unless a ransom is transferred. In a young tech market like Vietnam, cyberattacks, including ransomware, cause serious concerns for State and non-State actors. They can take place anywhere since cyberspace has no physical border to hold them back. This raises a query about the application of international law in cyberspace, especially when the ransomware hits non-State actors. In such cases, the sovereignty principle, having a signi
APA, Harvard, Vancouver, ISO, and other styles
19

Al-Nawashi, Malek M., Obaida M. Al-hazaimeh, Tahat M. Nedal, Nasr Gharaibeh, Waleed A. Abu-Ain, and Tarik Abu-Ain. "Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 03 (2025): 170–90. https://doi.org/10.3991/ijim.v19i03.50727.

Full text
Abstract:
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are insufficient in protecting cyber systems against growing and changing threats. In order to address this problem, scholars have explored reinforcement learning (i.e., RL) as a potential solution for intricate cybersecurity decision-making difficulties. Nevertheless, the use of RL faces several obstacles, including dynamic attack scenarios, insufficient training data, and the challenge
APA, Harvard, Vancouver, ISO, and other styles
20

Prajapati, Praveen Kumar. "Cyberattacks Prediction with Machine Learning." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4106–8. https://doi.org/10.22214/ijraset.2025.68992.

Full text
Abstract:
A cyber-attack occurs when an organization uses cyberspace to disrupt, disrupted, disable, damage, or manipulate the infrastructure; This also occurs when the integrity of the data is destroyed or controlled information is stolen. The current state of cyberspace reflects uncertainty about the future of the Internet and its rapidly growing user base. New paradigms cause more concerns because the large data collected by the gadget sensors reveals a lot of information that can be used for concentrated attacks. Although the mounds of the extinct approach, models and algorithms have provided the ba
APA, Harvard, Vancouver, ISO, and other styles
21

Vasylenko, Serhii, Igor Samoilov, and Serhii Burian. "Method of control of the state of protection of the automated process control system of the critical infrastructure facility." Collection "Information Technology and Security" 10, no. 1 (2022): 17–26. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261047.

Full text
Abstract:
Constant dynamic processes of society informatization drastically change all spheres of its life, giving them new impulses and opportunities for implementation in the new conditions. At the same time, these processes are the cause of fundamentally new challenges for the security sector, which cause the deep penetration of information technology into all elements of infrastructure, including critical ones. Cyberattacks on critical information infrastructure facility of critical infrastructure facility (CIIF CIF) are particularly dangerous. Much of the CIIF CIF cyberthreats are related to the ma
APA, Harvard, Vancouver, ISO, and other styles
22

Shihab Ahmed, Ahmed. "Development a data mining techniques to detect and prevention cyber attack for cybersecurity." Muthanna Journal of Pure Science 11, no. 1 (2024): 1–27. http://dx.doi.org/10.52113/2/11.01.2024/1-27.

Full text
Abstract:
The identification and forecasting of cyber-attacks is crucial process. In this article, we describe a paradigm for cyber security that makes use of data mining to forecast cyberattacks and identify appropriate countermeasures. The framework’s two primary elements are the surveillance and prevention of cyberattacks. The system constructs a predictive model to forecast future cyberattacks after first extracting appropriate timing with cyberattacks from previous data that used a decision tree based on the J48 algorithm. A variety of cyber-attacks, involving DDoS, port scans, and SQL Injection, a
APA, Harvard, Vancouver, ISO, and other styles
23

Kolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.

Full text
Abstract:
Development of Smart Grid involves the introduction of Wide Area Measurement System (WAMS), which provides the use of information, computing and digital technologies for measuring, transmitting and processing operating parameters when solving control problems. In this regard, the increased vulnerability to cyberattacks of the control system was noted. The control of Smart Grid includes monitoring, forecasting and planning of the system operation based on its Electric Power System state estimation results. Therefore, the goal of the paper is to develop a mathematical instrument to bad data dete
APA, Harvard, Vancouver, ISO, and other styles
24

Surilova, O. O. "PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES." Constitutional State, no. 43 (October 26, 2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.

Full text
Abstract:
The article examines the issue of public attribution of cyberattacks threatening the European Union or its Member States, and effectiveness of the adopted «cyber diplomacy toolbox» within the Framework for a joint EU diplomatic response to malicious cyber activities. Since public attribution of cyberattacks is a sovereign political decision, which differs from legal attribution for the purpose of invoking state responsibility under Articles on State Responsibility for Internationally Wrongful Acts, author defines the rationale behind decisions to attribute or not to attribute cyberattacks to a
APA, Harvard, Vancouver, ISO, and other styles
25

Poptchev, Peter. "NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.

Full text
Abstract:
The article identifies the trends as well as documented instances of adversarial cyberattacks and hybrid warfare against NATO and EU Member States. It illustrates how these adversarial activities impact on the broader aspects of national security and defence, the socio-economic stability and the democratic order of the states affected, including on the cohesion of their respective societies. Cyberattacks by foreign actors—state and non-state—including state-sponsored attacks against democratic institutions, critical infrastructure and other governmental, military, economic, academic, social an
APA, Harvard, Vancouver, ISO, and other styles
26

Voronko, I. "DIFFERENTIAL-GAME MODEL OF INFORMATION PROTECTION FOR COMPUTER SYSTEMS OF TRANSPORT INFRASTRUCTURE." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 38 (2021): 201–12. http://dx.doi.org/10.32703/2617-9040-2021-38-198-19.

Full text
Abstract:
The article considers the reliability and protection of information of computer systems of transport infrastructure and describes the synthesis and analysis of differential game models and methods of modeling cyberattack processes on the server of computer information and diagnostic systems of the railway power supply distance. A unified differential-game model of the cyberattack process on the multi-task server of the information-diagnostic computer system of the lower level of the railway has been developed, which allows to obtain optimal strategies for information protection in cyberattacks
APA, Harvard, Vancouver, ISO, and other styles
27

Ahmed, Dalia Shihab, Abbas Abdulazeez Abdulhameed, and Methaq T. Gaata. "A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 86–135. http://dx.doi.org/10.58496/mjcs/2024/018.

Full text
Abstract:
The increasing complexity and sophistication of cyberattacks pose significant challenges to traditional network security tools. Software-defined networking (SDN) has emerged as a promising solution because of its centralized management and adaptability. However, cyber-attack detection in SDN settings remains a vital issue. The current literature lacks comprehensive assessment of SDN cyber-attack detection methods including preparation techniques, benefits and types of attacks analysed in datasets. This gap hinders the understanding of the strengths and weaknesses of various detection approache
APA, Harvard, Vancouver, ISO, and other styles
28

Kolosok, Irina, and Liudmila Gurina. "A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis." E3S Web of Conferences 216 (2020): 01029. http://dx.doi.org/10.1051/e3sconf/202021601029.

Full text
Abstract:
The paper offers an algorithm for detection of erroneous measurements (bad data) that occur at cyberattacks against systems for data acquisition, processing and transfer and cannot be detected by conventional methods of measurement validation at EPS state estimation. Combined application of wavelet analysis and theory of fuzzy sets when processing the SCADA and WAMS measurements produces higher accuracy of the estimates obtained under incomplete and uncertain data and demonstrates the efficiency of proposed approach for practical computations in simulated cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
29

Kallberg, Jan, and Bhavani Thuraisingham. "State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks." IT Professional 15, no. 3 (2013): 32–35. http://dx.doi.org/10.1109/mitp.2013.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lukicheva, I. A., and A. L. Kulikov. "The usage of power system multi-model forecasting aided state estimation for cyber attack detection." Power engineering: research, equipment, technology 23, no. 5 (2022): 13–23. http://dx.doi.org/10.30724/1998-9903-2021-23-5-13-23.

Full text
Abstract:
THE PURPOSE. Smart electrical grids involve extensive use of information infrastructure. Such an aggregate cyber-physical system can be subject to cyber attacks. One of the ways to counter cyberattacks is state estimation. State Estimation is used to identify the present power system operating state and eliminating metering errors and corrupted data. In particular, when a real measurement is replaced by a false one by a malefactor or a failure in the functioning of communication channels occurs, it is possible to detect false data and restore them. However, there is a class of cyberattacks, so
APA, Harvard, Vancouver, ISO, and other styles
31

LYSENKO, SERGII, DMYTRO SOKALSKYI, and IIANA MYKHASKO. "METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART." Computer systems and information technologies, no. 3 (April 14, 2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.

Full text
Abstract:
The paper presents a state-of-art of the methods for cyberattacks detection in the computer networks. The main accent was made on the concept of the resilience for the IT infrastructure. The concept of cyber resilience in the terms of cybersecurity was presented. The survey includes the set of approaches devoted to the problem of construction resilient infrastructures. All investigated approaches are aimed to construct and maintain infrastructure’s resilience for cyberattacks resistance. Mentioned techniques and frameworks keep the main principles to assure resilience. To do this there exists
APA, Harvard, Vancouver, ISO, and other styles
32

A. K. R. S., Anusha. "State of the Art - Cybercrimes and Cyber Security Policies and Countermeasures." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 2744–52. http://dx.doi.org/10.22214/ijraset.2023.57092.

Full text
Abstract:
Abstract: The world has become a global village because of the availability of Internet Connectivity and mobile devices to most of the masses around the world. The benefits of digitalization goes hand in hand with a steep rise in cybercrimes, cyber threats and cyberattacks. Cyber security has become crucial in our day to day life in order to protect our information systems. Cyber security has become a buzz word and has kindled interests among cyber security experts, researchers, academicians, private organizations and the government alike. This paper explores the state of the art in Cyber Secu
APA, Harvard, Vancouver, ISO, and other styles
33

Maltseva, Irina, Yuliya Chernish, and Roman Shtonda. "ANALYSIS OF SOME CYBER THREATS IN WAR." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 37–44. http://dx.doi.org/10.28925/2663-4023.2022.16.3744.

Full text
Abstract:
This article examines the most famous and high-profile cyber threats that were carried out against the state during the Russian invasion. We also analyzed the laws that were adopted during the hostilities on the territory of our state. They have significantly affected the protection against further threats to the entire system.The issue of Russia's destructive and destructive cyberattacks before the invasion of our country proves that cyberattacks play an important and strategic role in today's world and war, regardless of whether the public is aware of it. This threat is constant for us and i
APA, Harvard, Vancouver, ISO, and other styles
34

Tareq, Imad, Bassant Mohamed Elbagoury, Salsabil Amin El-Regaily, and El-Sayed M. El-Horbaty. "Deep Reinforcement Learning Approach for Cyberattack Detection." International Journal of Online and Biomedical Engineering (iJOE) 20, no. 05 (2024): 15–30. http://dx.doi.org/10.3991/ijoe.v20i05.48229.

Full text
Abstract:
Recently, there has been a growing concern regarding the detrimental effects of cyberattacks on both infrastructure and users. Conventional safety measures, such as encryption, firewalls, and intrusion detection, are inadequate to safeguard cyber systems against emerging and evolving threats. To address this issue, researchers have turned to reinforcement learning (RL) as a potential solution for complex decision-making problems in cybersecurity. However, the application of RL faces various obstacles, including a lack of suitable training data, dynamic attack scenarios, and challenges in model
APA, Harvard, Vancouver, ISO, and other styles
35

Poornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.

Full text
Abstract:
The Indian armed forces today face a significant threat of cyberattacks, particularly from hostile neighbouring states like China and Pakistan. Cyberattacks could potentially damage or cripple critical weapons platforms, major communications and ISR (intelligence, surveillance, and reconnaissance) systems, and vital infrastructure, undermining the military’s preparedness and war-fighting capabilities. How prepared is the Indian military to neutralise cyberattacks from adversaries such as China and Pakistan? This is the central question that this article attempts to address. The article contend
APA, Harvard, Vancouver, ISO, and other styles
36

Warchoł, Agnieszka. "Od ofiary do światowego lidera. Estonia po cyberatakach z 2007 roku." Politeja 20, no. 5(86) (2023): 307–27. http://dx.doi.org/10.12797/politeja.20.2023.86.14.

Full text
Abstract:
FROM VICTIM TO LEADER – ESTONIA AFTER THE 2007 CYBERATTACKS In the spring of 2007, Estonia became the target of co-ordinated cyberattacks. The attacks were part of a wider political conflict between Estonia and Russia over the relocation of a Soviet-era monument in Tallinn. The aim of this article is to present the effects of the cyberattacks on Estonian cybersecurity. The article consists of several parts. The first deals with the main causes of the conflict. In the second part, the author presents information about the direct results of the cyberattacks on Estonia. The last part presents str
APA, Harvard, Vancouver, ISO, and other styles
37

Ismail, Shereen, Diana W. Dawoud, and Hassan Reza. "Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review." Future Internet 15, no. 6 (2023): 200. http://dx.doi.org/10.3390/fi15060200.

Full text
Abstract:
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have several limitations which complicate the design of effective attack prevention and detection techniques. This paper aims to provide a comprehensive understanding of the fundamental principles underlying cybersecurity in WSNs. In addition to current and envisioned solutions that have been studied in detail, this review primarily focuses on state-of-the-art Machine Learning (ML) and Blockchain (BC) security techniques b
APA, Harvard, Vancouver, ISO, and other styles
38

Ponaganti, MURALI. "ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 2 (2020): 1139–48. http://dx.doi.org/10.61841/turcomat.v11i2.14507.

Full text
Abstract:
Since dispersed renewable energy sources are increasingly being integrated into the grid, developing a cyber security plan for active distribution systems has become more difficult. This article describes an approach to using electrical waveform analysis to identify and localise cyberattacks in distributed active distribution systems. The cornerstone for cyber attack detection is a sequential deep learning model, which allows the identification of even the slightest intrusions. The targeted cyberattack is initially localised inside the estimated cyberattack sub-region in a twostage process. We
APA, Harvard, Vancouver, ISO, and other styles
39

Sigholm, Johan. "Non-State Actors in Cyberspace Operations." Journal of Military Studies 4, no. 1 (2013): 1–37. http://dx.doi.org/10.1515/jms-2016-0184.

Full text
Abstract:
Abstract The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetric nature, the lack of attribution, the low cost of entry, the legal ambiguity, and its role as an efficient medium for protest, crime, espionage and military aggression, makes it an attractive domain for nation-states as well as non-state actors in cyber conflict. This paper studies the various non-state actors who coexist in cyberspace,
APA, Harvard, Vancouver, ISO, and other styles
40

Mura, Sarybayev, Kaliyeva Yeleukhan, Zhekenov Duman, and Islambek Parkhatzhan. "China's Co-Operation with Central Asian Countries on Cyber Security." Journal of Posthumanism 5, no. 5 (2025): 965–79. https://doi.org/10.63332/joph.v5i5.1415.

Full text
Abstract:
The issue of cyber security is becoming more and more important today, so this factor must be taken into account by all governments, because threats in the field of information technology are no less important than threats in any other sphere of state activity. So, cybersecurity is the state or process of protecting and recovering computer systems, networks, devices and programmes from any type of cyberattack. Cyberattacks pose an increasingly sophisticated and growing threat to sensitive user data worldwide as attackers use new techniques based on social engineering and artificial intelligenc
APA, Harvard, Vancouver, ISO, and other styles
41

Mokhor, Volodymyr, Oleksandr Korchenko, Serhii Honchar, Maxsim Komarov, and Alla Onyskova. "Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects." E3S Web of Conferences 280 (2021): 09009. http://dx.doi.org/10.1051/e3sconf/202128009009.

Full text
Abstract:
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure objects and the factors influencing the state of cybersecurity of the information system of the critical infrastructure object is performed. An explanation is given of why cybersecurity violations in automated process control systems can lead to consequences in the industrial sector and environmental impact. The need to develop effective and adequate proposals and measures for cybersecurity of information systems of the critical infrastructure objects is shown. The classification of assets that a
APA, Harvard, Vancouver, ISO, and other styles
42

EL-Ebiary, Ahmed H., Mostafa I. Marei, Mahmoud A. Attia, and Mohamed Mokhtar. "A sensorless cyberattacks mitigation technique based on braided lyapunov state observer." Electric Power Systems Research 235 (October 2024): 110881. http://dx.doi.org/10.1016/j.epsr.2024.110881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Тарасевич, Ксения Александровна. "Cyberattack as a Risk Factor During Formation of Business Reputation of a Commercial Legal Entity." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 2 (June 15, 2022): 87–92. http://dx.doi.org/10.26163/gief.2022.68.56.015.

Full text
Abstract:
Проводится анализ рисков и последствий кибератак для предпринимательской деятельности и деловой репутации юридических лиц. Исследуются свойства и особенности кибератак в коммерческом секторе, обосновывается необходимость противодействия угрозам в цифровом пространстве. Автор приходит к выводу о необходимости усиления взаимодействия на уровне государства, субъектов корпоративного сектора и представителей информационно-цифрового сообщества для создания действенного механизма по комплексной защите от угрозы кибератак. The article provides analysis of both risks and consequences of cyberattacks wi
APA, Harvard, Vancouver, ISO, and other styles
44

Pavel, Tal. "The Iranian Cyberattacks in Albania: Actors, Tactics, Targets." dot.pl, no. I (December 3, 2024): 105–23. https://doi.org/10.60097/dotpl/196772.

Full text
Abstract:
Objective – The paper analyses the Iranian cyber-attacks in Albania, a small but strategically important nation in the Balkans. It examines the cyber incidents attributed to Iranian actors, highlighting the tactics employed, targeted sectors, and the objectives behind these operations. As geopolitical tensions between Iran and Albania have escalated in recent years, mainly due to Albania's support for an Iranian dissident group, Tehran has increasingly resorted to cyber warfare as a tool of influence and retaliation. By assessing the effectiveness of these cyber campaigns and their implication
APA, Harvard, Vancouver, ISO, and other styles
45

Vega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids." Applied Sciences 10, no. 7 (2020): 2276. http://dx.doi.org/10.3390/app10072276.

Full text
Abstract:
The present research work focuses on overcoming cybersecurity problems in the Smart Grid. Smart Grids must have feasible data capture and communications infrastructure to be able to manage the huge amounts of data coming from sensors. To ensure the proper operation of next-generation electricity grids, the captured data must be reliable and protected against vulnerabilities and possible attacks. The contribution of this paper to the state of the art lies in the identification of cyberattacks that produce anomalous behaviour in network management protocols. A novel neural projectionist techniqu
APA, Harvard, Vancouver, ISO, and other styles
46

Acton, James M. "Cyber Warfare & Inadvertent Escalation." Daedalus 149, no. 2 (2020): 133–49. http://dx.doi.org/10.1162/daed_a_01794.

Full text
Abstract:
The advent of cyber warfare exacerbates the risk of inadvertent nuclear escalation in a conventional conflict. In theory, cyber espionage and cyberattacks could enhance one state's ability to undermine another's nuclear deterrent. Regardless of how effective such operations might prove in practice, fear of them could generate escalatory “use-‘em-before-you-lose-‘em” pressures. Additionally, cyber threats could create three qualitatively new mechanisms by which a nuclear-armed state might incorrectly conclude that its nuclear deterrent was under attack. First, cyber espionage could be mistaken
APA, Harvard, Vancouver, ISO, and other styles
47

Khalil, Ahmad, Mohammad Bitar, and S. Anandha Krishna Raj. "A New Era of Armed Conflict: The Role of State and Non-State Actors in Cyber Warfare with Special Reference to Russia-Ukraine War." TalTech Journal of European Studies 14, no. 2 (2024): 49–72. http://dx.doi.org/10.2478/bjes-2024-0016.

Full text
Abstract:
Abstract The use of cyber operations in armed conflicts has become a reality, with several states openly admitting to being involved in such activities. An increasing number of nations are developing military cyber capabilities, and the use of these operations is expected to rise. Advancements in offensive cyber capabilities have demonstrated that these operations can significantly impact civilian infrastructure and cause harm to humans. This study explores the complex application of international humanitarian law (IHL) to cyber warfare, focusing on the evolving roles of both state and non-sta
APA, Harvard, Vancouver, ISO, and other styles
48

MALAKHOVA, Tetiana. "CYBERSECURITY OF PUBLIC ADMINISTRATION BODIES IN THE CONTEXT OF MODERN HYBRID THREATS: INSTITUTIONAL AND TECHNOLOGICAL ASPECTS." Coordinates of Public Administration, no. 1 (June 30, 2025): 379–97. https://doi.org/10.62664/cpa.2025.01.18.

Full text
Abstract:
The article is devoted to the study of cybersecurity of public administration bodies in Ukraine in the context of modern hybrid threats, primarily caused by the aggression of the russian federation. The relevance of ensuring the resilience of state information and communication systems against massive cyberattacks, which are an integral part of hybrid warfare, is determined. The scientific novelty of this article lies in its comprehensive examination of the institutional and technological aspects of cybersecurity in public administration, specifically in the context of the hybrid war of 2020–2
APA, Harvard, Vancouver, ISO, and other styles
49

Xiao, Hanyu, Hao Wei, Qichen Liao, Qiongwei Ye, Changlin Cao, and Yawen Zhong. "Exploring the gamification of cybersecurity education in higher education institutions: An analytical study." SHS Web of Conferences 166 (2023): 01036. http://dx.doi.org/10.1051/shsconf/202316601036.

Full text
Abstract:
Our world has become increasingly dependent on electronic technology. As most economic, cultural, and social activities are conducted in cyberspace, how to protect data from cyberattacks has arisen as a prominent challenge. Cybersecurity education and training that improves awareness among personnel is recognized as an effective approach. Higher education institutions (HEIs) have become prime cyberattack targets as they hold vast amounts of valuable research and personal data. This paper analyses the state of cybersecurity in HEIs and the problems of cybersecurity education, and proposes the s
APA, Harvard, Vancouver, ISO, and other styles
50

Mtukushe, Namhla, Adeniyi K. Onaolapo, Anuoluwapo Aluko, and David G. Dorrell. "Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems." Energies 16, no. 13 (2023): 5206. http://dx.doi.org/10.3390/en16135206.

Full text
Abstract:
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing need for robust cybersecurity mechanisms to protect these systems from cyberattacks. A cyber-physical system is a combination of physical and cyber components, and a security breach in either component can lead to catastrophic consequences. Cyberattack detection and mitigation methods in CPSs involve the use of various techniques such as intrusion detection systems (IDSs), firewalls, access control mechanis
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!