Littérature scientifique sur le sujet « State cyberattacks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « State cyberattacks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "State cyberattacks"
Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Texte intégralDong, Jiping, Mengmeng Hao, Fangyu Ding, et al. "A Novel Multimodal Data Fusion Framework: Enhancing Prediction and Understanding of Inter-State Cyberattacks." Big Data and Cognitive Computing 9, no. 3 (2025): 63. https://doi.org/10.3390/bdcc9030063.
Texte intégralNizovtsev, Yuriy Yu, Andrii M. Lyseiuk, and Mykhailo Kelman. "From self-affirmation to national security threat." Revista Científica General José María Córdova 20, no. 38 (2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Texte intégralAnnef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA." Sriwijaya Journal of International Relations 1, no. 1 (2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Texte intégralKOLOSOK, Irina N., and Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods." Elektrichestvo 6, no. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Texte intégralKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng, and Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Texte intégralHomam, El-Taj. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications (IJNSA) 15, no. 3 (2023): 85–94. https://doi.org/10.5281/zenodo.8089578.
Texte intégralGórka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Texte intégralLeng, Yaxuan. "When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict." Lecture Notes in Education Psychology and Public Media 17, no. 1 (2023): 201–7. http://dx.doi.org/10.54254/2753-7048/17/20231249.
Texte intégralCostea, Ana Maria, and Mihail Caradaică. "Cyberattacks and the Erosion of State Sovereignty." Analele Universității din Oradea. Seria: Relații Internaționale și Studii Europene XVI (2024): 51–60. https://doi.org/10.58603/adsm6039.
Texte intégralThèses sur le sujet "State cyberattacks"
Morrison, Glenn Sean. "Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1535490827978036.
Texte intégralDi, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe." Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Texte intégralLivres sur le sujet "State cyberattacks"
Bittner, Marc-Philipp, Anabel Guntermann, Christoph Benedikt Müller, and Darius Rostam, eds. Cybersecurity als Unternehmensleitungsaufgabe. Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748927679.
Texte intégralFreilich, Charles D. The Changing Military Threat. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0004.
Texte intégralMauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.
Texte intégralKoppel, Ted. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Random House Audio, 2015.
Trouver le texte intégralLights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Broadway Books, 2016.
Trouver le texte intégralChapitres de livres sur le sujet "State cyberattacks"
Singh, Tarnveer. "State-Sponsored Cyberattacks." In Palgrave Studies in Cyberpsychology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85994-6_15.
Texte intégralSingh, Tarnveer. "Case Studies: State-Sponsored Cyberattacks." In Palgrave Studies in Cyberpsychology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85994-6_16.
Texte intégralShahin, Mohammad, FFrank Chen, Hamed Bouzary, Ali Hosseinzadeh, and Rasoul Rashidifar. "Implementation of a Novel Fully Convolutional Network Approach to Detect and Classify Cyber-Attacks on IoT Devices in Smart Manufacturing Systems." In Lecture Notes in Mechanical Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18326-3_11.
Texte intégralFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Texte intégralGugliandolo, Emilia, John Soldatos, and Habtamu Abie. "EU-CIP: European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_42.
Texte intégralMiadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting." In Global Studies. transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.
Texte intégralChacko, Ashwathy Anda, Bijolin Edwin, and M. Roshni Thanka. "Detecting the Lateral Movement in Cyberattack at the Early Stage Using Machine Learning Techniques." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2177-3_54.
Texte intégralSicard, Franck, Éric Zamai, and Jean-Marie Flaus. "Critical States Distance Filter Based Approach for Detection and Blockage of Cyberattacks in Industrial Control Systems." In Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4_5.
Texte intégralEdelman, R. David. "Evaluating Deterrence." In Rethinking Cyber Warfare. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0006.
Texte intégralEdelman, R. David. "Introduction." In Rethinking Cyber Warfare. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0001.
Texte intégralActes de conférences sur le sujet "State cyberattacks"
Baba, Abdullatif, and Basil Alothman. "Safeguarding a flying robot, designed to investigate the state of Smart Grid, against cyberattacks." In 2024 20th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA). IEEE, 2024. http://dx.doi.org/10.1109/mesa61532.2024.10704913.
Texte intégralBukharev, Dmitriy A., and Alexander N. Sokolov. "Performance Analysis of the Two-Stage Hybrid Anomaly Detection Model for ICS Subjected to Cyberattacks." In 2025 International Russian Smart Industry Conference (SmartIndustryCon). IEEE, 2025. https://doi.org/10.1109/smartindustrycon65166.2025.10985971.
Texte intégralSen, Ömer, Christoph Pohl, Immanuel Hacker, Markus Stroot, and Andreas Ulbig. "AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679448.
Texte intégralBukharev, Dmitriy A., and Alexander N. Sokolov. "Analysis of Historical Data Usage in Ensemble of Classification Methods within a Two-Stage Hybrid Model of ICS Subjected to Cyberattacks." In 2024 International Russian Automation Conference (RusAutoCon). IEEE, 2024. http://dx.doi.org/10.1109/rusautocon61949.2024.10694329.
Texte intégralKhan, Shiraz, Inseok Hwang, and James Goppert. "Robust State Estimation in the Presence of Stealthy Cyberattacks." In 2022 American Control Conference (ACC). IEEE, 2022. http://dx.doi.org/10.23919/acc53348.2022.9867774.
Texte intégralSaraswat, Govind, Rui Yang, Yajing Liu, and Yingchen Zhang. "Analyzing the effects of cyberattacks on distribution system state estimation." In 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2021. http://dx.doi.org/10.1109/isgt49243.2021.9372262.
Texte intégralKotsiuba, Igor. "Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI." In Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks. Promote Ukraine, 2019. http://dx.doi.org/10.34054/bdc004.
Texte intégralSun, Yizhou, and Ya Zhang. "Adaptive tracking control of unknown state target for CPSs subjected to cyberattacks." In 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2022. http://dx.doi.org/10.1109/icarcv57592.2022.10004235.
Texte intégralMuzyka, Viktoriia. "ATTRIBUTION OF CYBERATTACKS COMMITTED THROUGH CYBERINFRASTRUCTURE OF A THIRD STATE AND DUE DILIGENCE OBLIGATION." In Relevant Trends of Scientific Research in the Countries of Central and Eastern Europe. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-002-5-32.
Texte intégralParfenov, Denis, Lubov Zabrodina, Arthur Zhigalov, Vadim Torchin, and Anton Parfenov. "Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes." In 2019 International Conference on Engineering and Telecommunication (EnT). IEEE, 2019. http://dx.doi.org/10.1109/ent47717.2019.9030558.
Texte intégralRapports d'organisations sur le sujet "State cyberattacks"
Chernavskikh, Vladislav. Nuclear Weapons and Artificial Intelligence: Technological Promises and Practical Realities. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/vbqx6088.
Texte intégralKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Texte intégralRossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.
Texte intégralAnthony, Ian, Fei Su, and Lora Saalman. Naval Incident Management in Europe, East Asia and South East Asia. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzbg6990.
Texte intégralAbassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.
Texte intégral