Articles de revues sur le sujet « State cyberattacks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « State cyberattacks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Texte intégralDong, Jiping, Mengmeng Hao, Fangyu Ding, et al. "A Novel Multimodal Data Fusion Framework: Enhancing Prediction and Understanding of Inter-State Cyberattacks." Big Data and Cognitive Computing 9, no. 3 (2025): 63. https://doi.org/10.3390/bdcc9030063.
Texte intégralNizovtsev, Yuriy Yu, Andrii M. Lyseiuk, and Mykhailo Kelman. "From self-affirmation to national security threat." Revista Científica General José María Córdova 20, no. 38 (2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Texte intégralAnnef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA." Sriwijaya Journal of International Relations 1, no. 1 (2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Texte intégralKOLOSOK, Irina N., and Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods." Elektrichestvo 6, no. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Texte intégralKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng, and Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Texte intégralHomam, El-Taj. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications (IJNSA) 15, no. 3 (2023): 85–94. https://doi.org/10.5281/zenodo.8089578.
Texte intégralGórka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Texte intégralLeng, Yaxuan. "When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict." Lecture Notes in Education Psychology and Public Media 17, no. 1 (2023): 201–7. http://dx.doi.org/10.54254/2753-7048/17/20231249.
Texte intégralCostea, Ana Maria, and Mihail Caradaică. "Cyberattacks and the Erosion of State Sovereignty." Analele Universității din Oradea. Seria: Relații Internaționale și Studii Europene XVI (2024): 51–60. https://doi.org/10.58603/adsm6039.
Texte intégralHrushko, M. V. "ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE." Constitutional State, no. 43 (October 26, 2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.
Texte intégralPołeć, Jolanta, and Wojciech Trzaskowski. "The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe." Przegląd Nauk o Obronności, no. 12 (June 20, 2022): 111–30. http://dx.doi.org/10.37055/pno/150838.
Texte intégralNihreieva, Olena. "State responsibility for cyberattacks as a use of force in the context of the 2022 Russian invasion of Ukraine." IDP. Revista de Internet, Derecho y Política, no. 42 (January 7, 2025): 1–13. https://doi.org/10.7238/idp.v0i42.430724.
Texte intégralEichensehr, Kristen E. "Decentralized Cyberattack Attribution." AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Texte intégralAlsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani, and Raed Alsini. "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model." Symmetry 14, no. 7 (2022): 1450. http://dx.doi.org/10.3390/sym14071450.
Texte intégralEl-Taj, Homam. "THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES AGAINST CYBERCRIME IN SAUDI ARABIA." International Journal of Network Security & Its Applications 15, no. 03 (2023): 85–94. http://dx.doi.org/10.5121/ijnsa.2023.15306.
Texte intégralKnebel, Sebastian, Mario D. Schultz, and Peter Seele. "Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating." Journal of Information, Communication and Ethics in Society 20, no. 1 (2021): 91–109. http://dx.doi.org/10.1108/jices-01-2021-0015.
Texte intégralAnh, Mac Trang. "International Law Protection in Cyberspace Against Ransomware and Experience of Vietnam." Vietnamese Journal of Legal Sciences 9, no. 2 (2023): 1–26. http://dx.doi.org/10.2478/vjls-2023-0007.
Texte intégralAl-Nawashi, Malek M., Obaida M. Al-hazaimeh, Tahat M. Nedal, Nasr Gharaibeh, Waleed A. Abu-Ain, and Tarik Abu-Ain. "Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 03 (2025): 170–90. https://doi.org/10.3991/ijim.v19i03.50727.
Texte intégralPrajapati, Praveen Kumar. "Cyberattacks Prediction with Machine Learning." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4106–8. https://doi.org/10.22214/ijraset.2025.68992.
Texte intégralVasylenko, Serhii, Igor Samoilov, and Serhii Burian. "Method of control of the state of protection of the automated process control system of the critical infrastructure facility." Collection "Information Technology and Security" 10, no. 1 (2022): 17–26. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261047.
Texte intégralShihab Ahmed, Ahmed. "Development a data mining techniques to detect and prevention cyber attack for cybersecurity." Muthanna Journal of Pure Science 11, no. 1 (2024): 1–27. http://dx.doi.org/10.52113/2/11.01.2024/1-27.
Texte intégralKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Texte intégralSurilova, O. O. "PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES." Constitutional State, no. 43 (October 26, 2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.
Texte intégralPoptchev, Peter. "NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.
Texte intégralVoronko, I. "DIFFERENTIAL-GAME MODEL OF INFORMATION PROTECTION FOR COMPUTER SYSTEMS OF TRANSPORT INFRASTRUCTURE." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 38 (2021): 201–12. http://dx.doi.org/10.32703/2617-9040-2021-38-198-19.
Texte intégralAhmed, Dalia Shihab, Abbas Abdulazeez Abdulhameed, and Methaq T. Gaata. "A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 86–135. http://dx.doi.org/10.58496/mjcs/2024/018.
Texte intégralKolosok, Irina, and Liudmila Gurina. "A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis." E3S Web of Conferences 216 (2020): 01029. http://dx.doi.org/10.1051/e3sconf/202021601029.
Texte intégralKallberg, Jan, and Bhavani Thuraisingham. "State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks." IT Professional 15, no. 3 (2013): 32–35. http://dx.doi.org/10.1109/mitp.2013.20.
Texte intégralLukicheva, I. A., and A. L. Kulikov. "The usage of power system multi-model forecasting aided state estimation for cyber attack detection." Power engineering: research, equipment, technology 23, no. 5 (2022): 13–23. http://dx.doi.org/10.30724/1998-9903-2021-23-5-13-23.
Texte intégralLYSENKO, SERGII, DMYTRO SOKALSKYI, and IIANA MYKHASKO. "METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART." Computer systems and information technologies, no. 3 (April 14, 2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.
Texte intégralA. K. R. S., Anusha. "State of the Art - Cybercrimes and Cyber Security Policies and Countermeasures." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 2744–52. http://dx.doi.org/10.22214/ijraset.2023.57092.
Texte intégralMaltseva, Irina, Yuliya Chernish, and Roman Shtonda. "ANALYSIS OF SOME CYBER THREATS IN WAR." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 37–44. http://dx.doi.org/10.28925/2663-4023.2022.16.3744.
Texte intégralTareq, Imad, Bassant Mohamed Elbagoury, Salsabil Amin El-Regaily, and El-Sayed M. El-Horbaty. "Deep Reinforcement Learning Approach for Cyberattack Detection." International Journal of Online and Biomedical Engineering (iJOE) 20, no. 05 (2024): 15–30. http://dx.doi.org/10.3991/ijoe.v20i05.48229.
Texte intégralPoornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Texte intégralWarchoł, Agnieszka. "Od ofiary do światowego lidera. Estonia po cyberatakach z 2007 roku." Politeja 20, no. 5(86) (2023): 307–27. http://dx.doi.org/10.12797/politeja.20.2023.86.14.
Texte intégralIsmail, Shereen, Diana W. Dawoud, and Hassan Reza. "Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review." Future Internet 15, no. 6 (2023): 200. http://dx.doi.org/10.3390/fi15060200.
Texte intégralPonaganti, MURALI. "ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 2 (2020): 1139–48. http://dx.doi.org/10.61841/turcomat.v11i2.14507.
Texte intégralSigholm, Johan. "Non-State Actors in Cyberspace Operations." Journal of Military Studies 4, no. 1 (2013): 1–37. http://dx.doi.org/10.1515/jms-2016-0184.
Texte intégralMura, Sarybayev, Kaliyeva Yeleukhan, Zhekenov Duman, and Islambek Parkhatzhan. "China's Co-Operation with Central Asian Countries on Cyber Security." Journal of Posthumanism 5, no. 5 (2025): 965–79. https://doi.org/10.63332/joph.v5i5.1415.
Texte intégralMokhor, Volodymyr, Oleksandr Korchenko, Serhii Honchar, Maxsim Komarov, and Alla Onyskova. "Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects." E3S Web of Conferences 280 (2021): 09009. http://dx.doi.org/10.1051/e3sconf/202128009009.
Texte intégralEL-Ebiary, Ahmed H., Mostafa I. Marei, Mahmoud A. Attia, and Mohamed Mokhtar. "A sensorless cyberattacks mitigation technique based on braided lyapunov state observer." Electric Power Systems Research 235 (October 2024): 110881. http://dx.doi.org/10.1016/j.epsr.2024.110881.
Texte intégralТарасевич, Ксения Александровна. "Cyberattack as a Risk Factor During Formation of Business Reputation of a Commercial Legal Entity." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 2 (June 15, 2022): 87–92. http://dx.doi.org/10.26163/gief.2022.68.56.015.
Texte intégralPavel, Tal. "The Iranian Cyberattacks in Albania: Actors, Tactics, Targets." dot.pl, no. I (December 3, 2024): 105–23. https://doi.org/10.60097/dotpl/196772.
Texte intégralVega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids." Applied Sciences 10, no. 7 (2020): 2276. http://dx.doi.org/10.3390/app10072276.
Texte intégralActon, James M. "Cyber Warfare & Inadvertent Escalation." Daedalus 149, no. 2 (2020): 133–49. http://dx.doi.org/10.1162/daed_a_01794.
Texte intégralKhalil, Ahmad, Mohammad Bitar, and S. Anandha Krishna Raj. "A New Era of Armed Conflict: The Role of State and Non-State Actors in Cyber Warfare with Special Reference to Russia-Ukraine War." TalTech Journal of European Studies 14, no. 2 (2024): 49–72. http://dx.doi.org/10.2478/bjes-2024-0016.
Texte intégralMALAKHOVA, Tetiana. "CYBERSECURITY OF PUBLIC ADMINISTRATION BODIES IN THE CONTEXT OF MODERN HYBRID THREATS: INSTITUTIONAL AND TECHNOLOGICAL ASPECTS." Coordinates of Public Administration, no. 1 (June 30, 2025): 379–97. https://doi.org/10.62664/cpa.2025.01.18.
Texte intégralXiao, Hanyu, Hao Wei, Qichen Liao, Qiongwei Ye, Changlin Cao, and Yawen Zhong. "Exploring the gamification of cybersecurity education in higher education institutions: An analytical study." SHS Web of Conferences 166 (2023): 01036. http://dx.doi.org/10.1051/shsconf/202316601036.
Texte intégralMtukushe, Namhla, Adeniyi K. Onaolapo, Anuoluwapo Aluko, and David G. Dorrell. "Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems." Energies 16, no. 13 (2023): 5206. http://dx.doi.org/10.3390/en16135206.
Texte intégral