Littérature scientifique sur le sujet « State cyberattacks »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « State cyberattacks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "State cyberattacks"

1

Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.

Texte intégral
Résumé :
Over the years cybersecurity threats to and cyberattacks on the critical infrastructure by state and non-state actors have escalated in intensity and sophistication. Cyberattacks, such as the 2017 NotPetya ransomware attack, the 2020 SolarWinds software supply chain attack and the 2021 Colonial Pipeline ransomware attack, illustrate the vulnerability of critical infrastructure to cyberattacks.
 
 Most cyberattacks are committed across borders involving criminal hackers or state supported hackers. Furthermore, critical infrastructure is increasingly interconnected and interdependent.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Dong, Jiping, Mengmeng Hao, Fangyu Ding, et al. "A Novel Multimodal Data Fusion Framework: Enhancing Prediction and Understanding of Inter-State Cyberattacks." Big Data and Cognitive Computing 9, no. 3 (2025): 63. https://doi.org/10.3390/bdcc9030063.

Texte intégral
Résumé :
Inter-state cyberattacks are increasingly becoming a major hidden threat to national security and global order. However, current prediction models are often constrained by single-source data due to insufficient consideration of complex influencing factors, resulting in limitations in understanding and predicting cyberattacks. To address this issue, we comprehensively consider multiple data sources including cyberattacks, bilateral interactions, armed conflicts, international trade, and national attributes, and propose an interpretable multimodal data fusion framework for predicting cyberattack
Styles APA, Harvard, Vancouver, ISO, etc.
3

Nizovtsev, Yuriy Yu, Andrii M. Lyseiuk, and Mykhailo Kelman. "From self-affirmation to national security threat." Revista Científica General José María Córdova 20, no. 38 (2022): 355–70. http://dx.doi.org/10.21830/19006586.905.

Texte intégral
Résumé :
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon
Styles APA, Harvard, Vancouver, ISO, etc.
4

Annef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA." Sriwijaya Journal of International Relations 1, no. 1 (2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.

Texte intégral
Résumé :
Several policies made by country during pandemic related to restriction and prohibition of public mobility implicated to cyberspace activities. Internet Users in Indonesia increased significantly by 17% in 2020 compared to 2019. Internet Users escalation during pandemic reciprocal with the rise of cyberattacks. By using qualitative methods, this paper aims to explain the phenomenon using two approaches, non-traditional security and cybersecurity. The author's findings show that cyberattacks in Indonesia elevated by 5 times in 2020. Some of these cyberattacks include phishing emails, ransomware
Styles APA, Harvard, Vancouver, ISO, etc.
5

KOLOSOK, Irina N., and Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods." Elektrichestvo 6, no. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.

Texte intégral
Résumé :
The hardware and software tools of the data acquisition and processing systems, as well as the state estimation procedure intended to support the actions of dispatching personnel in performing operational and emergency control of electric power systems (EPS), are critically important components of the EPS information and communication subsystem, but at the same time, they are most vulnerable to cyberattacks. To reduce the extent to which cyberattacks can affect the control quality, it is proposed to use statistical methods for processing measurement information. First of all, these are static
Styles APA, Harvard, Vancouver, ISO, etc.
6

Khattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng, and Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.

Texte intégral
Résumé :
Active traffic management (ATM) systems have been introduced by transportation agencies to manage recurrent and non-recurrent congestion. ATM systems rely on the interconnectivity of components made possible by wired and/or wireless networks. Unfortunately, this connectivity that supports ATM systems also provides potential system access points that results in vulnerability to cyberattacks. This is becoming more pronounced as ATM systems begin to integrate Internet of Things (IoT) devices. Hence, there is a need to rigorously evaluate ATM systems for cyberattack vulnerabilities, and explore de
Styles APA, Harvard, Vancouver, ISO, etc.
7

Homam, El-Taj. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications (IJNSA) 15, no. 3 (2023): 85–94. https://doi.org/10.5281/zenodo.8089578.

Texte intégral
Résumé :
Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks being reported since 2020. These cyberattacks significantly threaten the country's national security, economic stability, and personal privacy. In this article, we will explore the types of cyberattacks that have been observed in Saudi Arabia after 2020, the impact they have had on the country, and the measures taken by the Saudi government to counter these attacks. This article is aimed at providing a comprehensive understanding of the current state of cyberattacks in Saudi Arabia and the m
Styles APA, Harvard, Vancouver, ISO, etc.
8

Górka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.

Texte intégral
Résumé :
Abstract The article deals with cyber incidents that were recorded in the area of the V4 countries. It is important for the discussed topic to extract certain factors and with their help to characterise the conducted cyberattacks in terms of political motivations. The analysis tries to prove the existence of politically motivated cyberattacks. This, in turn, helps to determine the consequences of such cyber incidents. Moreover, the scale and magnitude of the cyberattack can be information to determine the strategic maturity and cyber capabilities of the adversary. Thus, the incidents that have
Styles APA, Harvard, Vancouver, ISO, etc.
9

Leng, Yaxuan. "When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict." Lecture Notes in Education Psychology and Public Media 17, no. 1 (2023): 201–7. http://dx.doi.org/10.54254/2753-7048/17/20231249.

Texte intégral
Résumé :
In todays international community, cyberattacks occur frequently, and cyberspace has become an important battlefield for political games among major powers. Under the push of cyberattacks, the tension between Russia and Ukraine has further escalated. However, due to the unique nature of cyberspace, the rules under the existing international law are difficult to directly apply to the field of cyberspace. This has allowed states and non-state actors to willfully disrupt the network systems and other infrastructure of other countries, causing damage to people or property. One major issue is when
Styles APA, Harvard, Vancouver, ISO, etc.
10

Costea, Ana Maria, and Mihail Caradaică. "Cyberattacks and the Erosion of State Sovereignty." Analele Universității din Oradea. Seria: Relații Internaționale și Studii Europene XVI (2024): 51–60. https://doi.org/10.58603/adsm6039.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "State cyberattacks"

1

Morrison, Glenn Sean. "Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1535490827978036.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe." Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.

Texte intégral
Résumé :
Les systèmes informatiques sont des éléments essentiels de l'interaction politique, sociale et économique et sont devenus fondamentaux pour le développement et l'innovation. Ces systèmes sont pourtant autant de ressources qu'ils peuvent être vecteurs de menaces pour la sécurité, les droits et les libertés des utilisateurs. En effet, les atteintes aux systèmes de traitement automatisé de données se matérialisent par des procédés infractionnels divers, réalisés par des catégories d'auteurs variées et touchant de nombreuses victimes différentes telles que les particuliers, les entreprises, ou enc
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "State cyberattacks"

1

Bittner, Marc-Philipp, Anabel Guntermann, Christoph Benedikt Müller, and Darius Rostam, eds. Cybersecurity als Unternehmensleitungsaufgabe. Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748927679.

Texte intégral
Résumé :
Cybersecurity is a central challenge for many companies. On the one hand, companies have to protect themselves against cyberattacks; on the other hand, they have special obligations towards third parties and the state in critical infrastructures or when dealing with personal data. These responsibilities converge with company management. This volume examines the duties and liability risks of management in connection with cyber security from the perspective of corporate, constitutional and labour law. The volume is based on a conference of the same name, which took place in cooperation with the
Styles APA, Harvard, Vancouver, ISO, etc.
2

Freilich, Charles D. The Changing Military Threat. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0004.

Texte intégral
Résumé :
Chapter 3 argues that the military threat Israel faces has changed dramatically. Attacks by Arab armies are now the least likely, and the overall threat has diminished. Israel’s conventional superiority led its adversaries to adopt a decades-long strategy of attrition designed to lead to Israel’s collapse. Iran is the most sophisticated adversary Israel has ever faced, its ongoing nuclear program the greatest threat. Hezbollah’s rockets are the primary immediate threat. Iran, Hezbollah, and Syria now constitute one joint front. They and Hamas believe that the home front is Israel’s Achilles he
Styles APA, Harvard, Vancouver, ISO, etc.
3

Mauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.

Texte intégral
Résumé :
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages?This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, t
Styles APA, Harvard, Vancouver, ISO, etc.
4

Koppel, Ted. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Random House Audio, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Broadway Books, 2016.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "State cyberattacks"

1

Singh, Tarnveer. "State-Sponsored Cyberattacks." In Palgrave Studies in Cyberpsychology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85994-6_15.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Singh, Tarnveer. "Case Studies: State-Sponsored Cyberattacks." In Palgrave Studies in Cyberpsychology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85994-6_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shahin, Mohammad, FFrank Chen, Hamed Bouzary, Ali Hosseinzadeh, and Rasoul Rashidifar. "Implementation of a Novel Fully Convolutional Network Approach to Detect and Classify Cyber-Attacks on IoT Devices in Smart Manufacturing Systems." In Lecture Notes in Mechanical Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18326-3_11.

Texte intégral
Résumé :
AbstractIn recent years, Internet of things (IoT) devices have been widely implemented and industrially improved in manufacturing settings to monitor, collect, analyze, and deliver data. Nevertheless, this evolution has increased the risk of cyberattacks, significantly. Consequently, developing effective intrusion detection systems based on deep learning algorithms has proven to become a dependable intelligence tool to protect Industrial IoT devices against cyber-attacks. In the current study, for the first time, two different classifications and detection long short-term memory (LSTM) archite
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Texte intégral
Résumé :
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the f
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gugliandolo, Emilia, John Soldatos, and Habtamu Abie. "EU-CIP: European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_42.

Texte intégral
Résumé :
AbstractIn our interconnected world, critical infrastructure systems are essential for modern societies. However, they face increasing threats, from cyberattacks to natural disasters. To address these challenges, the EU-CIP (Critical Infrastructure Protection) mission, a 3-year Coordination and Support Action funded by the European Commission, was initiated in October 2022. This chapter presents preliminary findings from the EU-CIP-ANALYSIS activities, shedding light on the evolving landscape of critical infrastructure protection. Preliminary findings reveal key needs, including adaptability,
Styles APA, Harvard, Vancouver, ISO, etc.
6

Miadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting." In Global Studies. transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.

Texte intégral
Résumé :
According to the 2016 EU Global Strategy (EUGS), today's world is characterized by an increased strategic competition and rising threats to multilateralism and a rules-based order. In this fast-evolving environment, the EU has shifted from its traditional “values-based” approach in foreign policy to a “principled pragmatism”. This holds that the EU should solidify relations with countries with shared values, while also engaging strategically with rivals. The EU's goal is to protect its strategic interests in the world marked by the US-China rivalry, a confrontational relationship with the Trum
Styles APA, Harvard, Vancouver, ISO, etc.
7

Chacko, Ashwathy Anda, Bijolin Edwin, and M. Roshni Thanka. "Detecting the Lateral Movement in Cyberattack at the Early Stage Using Machine Learning Techniques." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2177-3_54.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Sicard, Franck, Éric Zamai, and Jean-Marie Flaus. "Critical States Distance Filter Based Approach for Detection and Blockage of Cyberattacks in Industrial Control Systems." In Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Edelman, R. David. "Evaluating Deterrence." In Rethinking Cyber Warfare. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0006.

Texte intégral
Résumé :
Abstract Chapter 3 asks whether cyberattack capabilities, as tools of deterrence, might play a role in keeping the peace, even without featuring into war. It is oriented around three key questions. In seeking to restrain state use of cyberattacks, will states: self-restrain if cyberattacks are of limited deterrent value; be deterred from acquiring or using cyberattack capabilities by other states doing the same; and deterred from acquiring or using them by other states’ more traditional (noncyber) capabilities? An introductory section defines the notion of deterrence and situates it within the
Styles APA, Harvard, Vancouver, ISO, etc.
10

Edelman, R. David. "Introduction." In Rethinking Cyber Warfare. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0001.

Texte intégral
Résumé :
Abstract The introduction orients the reader on the topic of the book: state-on-state cyberattacks, which it argues are an uncommon but arguably far more significant phenomenon in the broad sweep of international security than many more commonly discussed activities, meriting deeper analysis than they have received to date. After outlining the reasons that increasing digital dependency suggests a growing motivation for and damage caused by cyberattacks, the introduction centers the work specifically on the topic of restraint. It argues that the scale of potential disruption and growing prolife
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "State cyberattacks"

1

Baba, Abdullatif, and Basil Alothman. "Safeguarding a flying robot, designed to investigate the state of Smart Grid, against cyberattacks." In 2024 20th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA). IEEE, 2024. http://dx.doi.org/10.1109/mesa61532.2024.10704913.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Bukharev, Dmitriy A., and Alexander N. Sokolov. "Performance Analysis of the Two-Stage Hybrid Anomaly Detection Model for ICS Subjected to Cyberattacks." In 2025 International Russian Smart Industry Conference (SmartIndustryCon). IEEE, 2025. https://doi.org/10.1109/smartindustrycon65166.2025.10985971.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Sen, Ömer, Christoph Pohl, Immanuel Hacker, Markus Stroot, and Andreas Ulbig. "AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679448.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bukharev, Dmitriy A., and Alexander N. Sokolov. "Analysis of Historical Data Usage in Ensemble of Classification Methods within a Two-Stage Hybrid Model of ICS Subjected to Cyberattacks." In 2024 International Russian Automation Conference (RusAutoCon). IEEE, 2024. http://dx.doi.org/10.1109/rusautocon61949.2024.10694329.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Khan, Shiraz, Inseok Hwang, and James Goppert. "Robust State Estimation in the Presence of Stealthy Cyberattacks." In 2022 American Control Conference (ACC). IEEE, 2022. http://dx.doi.org/10.23919/acc53348.2022.9867774.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Saraswat, Govind, Rui Yang, Yajing Liu, and Yingchen Zhang. "Analyzing the effects of cyberattacks on distribution system state estimation." In 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2021. http://dx.doi.org/10.1109/isgt49243.2021.9372262.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kotsiuba, Igor. "Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI." In Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks. Promote Ukraine, 2019. http://dx.doi.org/10.34054/bdc004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Sun, Yizhou, and Ya Zhang. "Adaptive tracking control of unknown state target for CPSs subjected to cyberattacks." In 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2022. http://dx.doi.org/10.1109/icarcv57592.2022.10004235.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Muzyka, Viktoriia. "ATTRIBUTION OF CYBERATTACKS COMMITTED THROUGH CYBERINFRASTRUCTURE OF A THIRD STATE AND DUE DILIGENCE OBLIGATION." In Relevant Trends of Scientific Research in the Countries of Central and Eastern Europe. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-002-5-32.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Parfenov, Denis, Lubov Zabrodina, Arthur Zhigalov, Vadim Torchin, and Anton Parfenov. "Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes." In 2019 International Conference on Engineering and Telecommunication (EnT). IEEE, 2019. http://dx.doi.org/10.1109/ent47717.2019.9030558.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "State cyberattacks"

1

Chernavskikh, Vladislav. Nuclear Weapons and Artificial Intelligence: Technological Promises and Practical Realities. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/vbqx6088.

Texte intégral
Résumé :
Recent advances in the capabilities of artificial intelligence (AI) have increased state interest in leveraging AI for military purposes. Military integration of advanced AI by nuclear-armed states has the potential to have an impact on elements of their nuclear deterrence architecture such as missile early-warning systems, intelligence, surveillance and reconnaissance (ISR) and nuclear command, control and communications (NC3), as well as related conventional systems. At the same time, a number of technological and logistical factors can potentially limit or slow the adoption of AI in the nuc
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Texte intégral
Résumé :
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review foc
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.

Texte intégral
Résumé :
Due to the increased reliance of governments on digital data, it is probably safe to suggest that, without it, there would be no state left to defend. Because, without data, there might not even be a continuity of government, and consequently no state, in a time of crisis. Hence, this paper looks at critical national digital data as a key feature of national security. This paper shows why and how the protection of digitalised critical national data is important for a country’s defence at different levels of conflict, both below and above the threshold of armed conflict. This issue can be studi
Styles APA, Harvard, Vancouver, ISO, etc.
4

Anthony, Ian, Fei Su, and Lora Saalman. Naval Incident Management in Europe, East Asia and South East Asia. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzbg6990.

Texte intégral
Résumé :
Unprecedented global turbulence in 2022 has demonstrated the need to pay increased attention to naval operations. Enhanced military capability allows naval power projection far beyond home waters. New threats and challenges are emerging from technological advances and new applications, not least the vulnerability of warships and naval facilities to cyber intrusions and cyberattacks. As states implement the programmes they need to protect and promote their interests at sea, there is also likely to be an increase in the number of close tracking incidents. How effective current risk reduction mec
Styles APA, Harvard, Vancouver, ISO, etc.
5

Abassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.

Texte intégral
Résumé :
The strategic convergence between Russia, Iran, and China poses a growing systemic threat to the European Union. Despite differing regional agendas, these three powers are increasingly aligned in key areas such as cybersecurity, military technology transfers, intelligence cooperation, and disinformation campaigns. Their coordinated efforts undermine the EU’s critical infrastructure, weaken its strategic autonomy, and erode trust in democratic institutions by targeting sectors such as energy, finance, healthcare, and electoral integrity. Although the EU has implemented sanctions and reinforced
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!