Letteratura scientifica selezionata sul tema "Cyber defensive"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cyber defensive".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Cyber defensive"

1

Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.

Testo completo
Abstract (sommario):
This paper examines how the distribution of offensive and defensive cyber operations (OCO & DCO) contributes to the achievement of strategic goals. Drawing on established theories of the relationship of offensive and defensive weaponry in terrestrial conflict domains, the examination develops a methodological framework to assess the relative contributions of OCO and DCO to offensive and defensive cyber strategies and overall multi-domain outcomes. The paper identifies both challenges and opportunities in associating offensive and defensive cyber capabilities with appropriate offensive and
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Duvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.

Testo completo
Abstract (sommario):
While the centrality of cyber power in the safeguarding and advancing nation states’ national interests and objectives is now widely accepted, the academic discourse (on cyber power) is still incipient. In literature reviewed, cyber power is predominantly viewed as comprising of two dimensions, namely offensive and defensive. The exploratory analysis we conducted found that Africa’s unique, contextual factors necessitate an expanded conceptualisation of cyber power. This alternative conceptualisation does not dispute the existing notion that cyber power has offensive and defensive dimensions.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Lachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.

Testo completo
Abstract (sommario):
Modern civilian and military marine vessels employ integrated platform management systems to monitor and control various different operational ship systems such has engine control, navigation and potentially weapon systems. These platform management systems consist of information and operational technology (IT/OT) environments that integrate commercial operating systems, TCP/IP based protocols and supervisory control and data acquisition (SCADA) systems in order to monitor and control marine cyber physical systems. This integration of technologies introduces threat vectors as well as unique op
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Awan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Segell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.

Testo completo
Abstract (sommario):
The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional. An escalation in one could lead to an overall escalation in all. In the political areas and, by extension, in civil-military relations (CMR), the IDF has a defensive mode as routine, while an offensive mode is manifest rarely in emergencies and war. The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel’s adversaries do not share the same policies with regular cyber and terror attacks against
Gli stili APA, Harvard, Vancouver, ISO e altri
6

ZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.

Testo completo
Abstract (sommario):
The general trends and features of the formation of cyber forces in countries such as Poland and the Czech Republic are determined. The measures devoted to the creation of cyber forces in the mentioned NATO countries have been analyzed. The competence, powers and functional tasks of the practical activities of the responsible cyber units were considered. The peculiarities of the use of cyber troops in the framework of conducting defensive and offensive cyber operations are summarized. Based on the generalization of the positive Polish and Czech experience of creating cyber forces, the prospect
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Venkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.

Testo completo
Abstract (sommario):
Organizations are now facing more complex cyber threats, prompting them to implement forward-thinking security testing methods to protect their digital systems. The Red Team and Blue Team simulations offer a practical method for evaluating an organization's ability to withstand cyber threats by mimicking actual attacks and the corresponding defensive measures taken in response. These exercises aid in uncovering system weaknesses, boosting threat recognition, and refining incident response capacities. Integrating artificial intelligence-driven threat intelligence, automated security checks, and
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Zajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.

Testo completo
Abstract (sommario):
This paper examines Five Eyes surveillance programs as a threat to IT (Information Technology) security and IT security as resistance to these programs. I argue that the most significant of Snowden's disclosures have been the Five Eyes agencies’ systematic compromise of the technologies, networks, and standards in use within their own countries and abroad. Attacks on domestic infrastructure contradict the defensive posture of these agencies but are consistent with the project of cyber security as defined by the Five Eyes. The cyber security project of the Five Eyes nations is expansive in scop
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Alothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.

Testo completo
Abstract (sommario):
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incident response. In this research work, we proposed a cyber incident model to handle real-time security attacks in various scenarios. The proposed model consisted of three teams: (1) the black team, (2) the red team, and (3) the blue team. The black team was a group of instructors responsible for setting up the environment. They had to educate the red and b
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Johnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.

Testo completo
Abstract (sommario):
Cyber attackers commonly operate in teams, which may process information collectively and thus, may be best understood when the team is treated as the unit of analysis. Future research in Oppositional Human Factors (OHF) should consider the impact of team-influencing and team-level biases and the impact that defensive interventions have on team cognition in general. Existing measurement approaches using team interactions may be well suited for studying red teams, and how OHF interventions impact cyber attackers.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Cyber defensive"

1

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Testo completo
Abstract (sommario):
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and comput
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Wong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.

Testo completo
Abstract (sommario):
With increased dependency on the Internet, cyber attacks are fast becoming an attractive option for state adversaries, in part because of the ease of hiding one's identity. In response, governments around the world are taking measures to improve their national cyber defenses. However, these defenses, which are generally passive in nature, have been insufficient to address the threat. This thesis explores the possibility of employing active cyber defenses to improve cyber defenses at the national level. Active cyber defense refers to the use of offensive actions, such as counter hacking, pr
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Stensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.

Testo completo
Abstract (sommario):
Approved for public release; distribution is unlimited.<br>This thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norways strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control. Norway must increasingly be perceived as a serio
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.

Testo completo
Abstract (sommario):
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Moran, Daniel ; Denning, Dorothy. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 93-102). Also available in print.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.

Testo completo
Abstract (sommario):
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses of actions by convincing the aggressor that cost exceeds the profit. In cyberspace, where the costs are lower, deterrence is disputed because of the natural interconnectedness and constant actions. The aim of this study is to investigate how the US understands cyber deterrence. This study is motivated by the current ambiguity regarding whether deterrence works in cyberspace or not. Using both theories of conventional and cyber deterrence together with theories of offense and defense, the study fo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.

Testo completo
Abstract (sommario):
Approved for public release; distribution is unlimited<br>The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber tec
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.

Testo completo
Abstract (sommario):
With recent advances in electronics and communication technologies, our daily lives are immersed in an environment of Internet-connected smart things. Despite the great convenience brought by the development of these technologies, privacy concerns and security issues are two topics that deserve more attention. On one hand, as smart things continue to grow in their abilities to sense the physical world and capabilities to send information out through the Internet, they have the potential to be used for surveillance of any individuals secretly. Nevertheless, people tend to adopt wearable devices
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.

Testo completo
Abstract (sommario):
Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usability.  Due to the proliferation of increasingly sophisticated cyber threats with exponentially destructiv
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Testo completo
Abstract (sommario):
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Cyber defensive"

1

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kott, Alexander, Cliff Wang, and Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Baddi, Youssef, Mohammed Amin Almaiah, Omar Almomani, and Yassine Maleh. The Art of Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781032714806.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Edwards, Dr Jason. Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Vijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kshetri, Naresh, Purnendu Shekhar Pandey, and Mohiuddin Ahmed. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures. CRC Press, 2024. https://doi.org/10.1201/9781003449515.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Rani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "Cyber defensive"

1

Kassab, Hanna Samir. "Cyber-Vulnerability." In Prioritization Theory and Defensive Foreign Policy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-48018-3_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Katagiri, Nori. "Why Defensive Measures Are Too Defensive: Strategy of Denial." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Huang, Linan, and Quanyan Zhu. "Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception." In Autonomous Cyber Deception. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Turtiainen, Hannu, Andrei Costin, and Timo Hämäläinen. "Defensive Machine Learning Methods and the Cyber Defence Chain." In Artificial Intelligence and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Osula, Anna-Maria. "Building Cyber Resilience: The Defensive Shield for the EU." In New Security Challenges. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08384-6_9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Zhao, Jiamiao, Fei Hu, and Xiali Hei. "Defensive Schemes for Cyber Security of Deep Reinforcement Learning." In AI, Machine Learning and Deep Learning. CRC Press, 2023. http://dx.doi.org/10.1201/9781003187158-12.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Manasa, Koppula, and L. M. I. Leo Joseph. "IoT Security Vulnerabilities and Defensive Measures in Industry 4.0." In Artificial Intelligence and Cyber Security in Industry 4.0. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2115-7_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Testo completo
Abstract (sommario):
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the f
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hodges, Duncan, and Oliver Buckley. "Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_34.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Cabada, Pavol. "Cyber-Democracy and Cyber-Defense." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_11-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Cyber defensive"

1

Zhao, Zhenqi, Jun Teng, Wenduo Yu, Fan Yang, Linjiang Deng, and Bangpeng He. "Offensive and Defensive Strategy for Distribution Network CPS Considering EV Source-charge Bidirectional." In 2024 Second International Conference on Cyber-Energy Systems and Intelligent Energy (ICCSIE). IEEE, 2024. http://dx.doi.org/10.1109/iccsie61360.2024.10698065.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Cao, Jintao, Allie Null, Marissa Stewart, Suman Bhunia, and Mohammad Salman. "Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity." In 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics. IEEE, 2024. http://dx.doi.org/10.1109/ithings-greencom-cpscom-smartdata-cybermatics62450.2024.00065.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Pavelka, Martin, and Ladislav Hudec. "Countermeasures Management in Cyber Defense Exercises." In 2024 New Trends in Signal Processing (NTSP). IEEE, 2024. http://dx.doi.org/10.23919/ntsp61680.2024.10726308.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Velazquez, Alexander, Johannes F. Loevenich, Tobias Hürten, et al. "Cyber Operations Gyms to Train Autonomous Cyber Defense Agents for NATO." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047884.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Lofy, Cheri, and Mark Vriesenga. "Demystifying Cyber Systems Engineering." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3864.

Testo completo
Abstract (sommario):
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;As the United States’ (US) Department of Defense (DoD) works to maintain our battlefield superiority in the ground domain, we rapidly integrate new electronic capabilities into vehicles that communicate and cooperate over vehicle-to-infrastructure networks. These new capabilities contribute to increasing the potential attack surface, as described in the 2018 Government Accountability Office (GAO) report on Weapon System Cyber Security [&lt;xref rid="R1" ref-type="bibr"&gt;1&lt;/xref&gt;]. To understand the increasingly complex attack surface and to
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Mckneely, Jennifer, Tara Sell, Kathleen Straub, and Daniel Thomas. "Defensive Cyber Maneuvers to Disrupt Cyber Attackers." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2023. http://dx.doi.org/10.24251/hicss.2023.814.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Ferguson-Walter, Kimberly, Sunny Fugate, Justin Mauger, and Maxine Major. "Game theory for adaptive defensive cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314063.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Bierbrauer, David, Robert Schabinger, Caleb Carlin, Jonathan Mullin, John Pavlik, and Nathaniel D. Bastian. "Autonomous cyber warfare agents: dynamic reinforcement learning for defensive cyber operations." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, edited by Latasha Solomon and Peter J. Schwartz. SPIE, 2023. http://dx.doi.org/10.1117/12.2663093.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Parker, Thomas, Jeremy Jones, Joshua Mayberry, et al. "Defensive Cyber Operations in a Software-Defined Network." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.688.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Hu, Bing, Longqiang Zhang, Zhiwu Guo, et al. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.

Testo completo
Abstract (sommario):
With the introduction of digital instrumentation system, the cyber security threat to nuclear power plants is becoming more and more serious. The existing cyber security standards of nuclear power plants still need to be improved, and the technology practice of defensive strategies is lacking all over the world. In this paper, based on the comparison of domestic and foreign regulations and standards, combined with the technical practice of I&amp;C system overall plan, a defense-in-depth model based on data flow is proposed. The overall technical requirements, hierarchy, network model, cyber se
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Cyber defensive"

1

Su, Fei, Larisa Saveleva Dovgal, and Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/ttrc4774.

Testo completo
Abstract (sommario):
While the European Union as a collective entity continues to abstain from endorsing an offensive cyber posture, several of its member states have adopted both defensive and offensive activities and capabilities in cyberspace. In doing so, these member states mirror trends in China, Russia and the United States, which seem to possess increasingly similar strategies for balancing defensive and offensive cyber operations. Given this context, EU policy will need to navigate the potential involvement of its member states in offensive operations, while continuing to advocate for a defence-centric st
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Carey, III, and Casimir C. NATO's Options for Defensive Cyber Against Non-State Actors. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592754.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Buchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.

Testo completo
Abstract (sommario):
Machine learning advances are transforming cyber strategy and operations. This necessitates studying national security issues at the intersection of AI and cybersecurity, including offensive and defensive cyber operations, the cybersecurity of AI systems, and the effect of new technologies on global stability.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Lohn, Andrew, Anna Knack, Ant Burke, and Krystal Jackson. Autonomous Cyber Defense. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/2022ca007.

Testo completo
Abstract (sommario):
The current AI-for-cybersecurity paradigm focuses on detection using automated tools, but it has largely neglected holistic autonomous cyber defense systems — ones that can act without human tasking. That is poised to change as tools are proliferating for training reinforcement learning-based AI agents to provide broader autonomous cybersecurity capabilities. The resulting agents are still rudimentary and publications are few, but the current barriers are surmountable and effective agents would be a substantial boon to society.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Hoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca007.

Testo completo
Abstract (sommario):
As states turn to AI to gain an edge in cyber competition, it will change the cat-and-mouse game between cyber attackers and defenders. Embracing machine learning systems for cyber defense could drive more aggressive and destabilizing engagements between states. Wyatt Hoffman writes that cyber competition already has the ingredients needed for escalation to real-world violence, even if these ingredients have yet to come together in the right conditions.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Plantenga, Todd, and Tamara Gibson Kolda. Analytics for Cyber Network Defense. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1113857.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Smith, Randall. Multi-Community Cyber Defense (MCCD). Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408408.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Giles, Keir, and Kim Hartmann. Cyber Defense: An International View. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622264.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Luckinbill, Ryan. Cyber Defense Competition Card Game. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-471.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Colbaugh, Richard, and Kristin L. Glass. Proactive defense for evolving cyber threats. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059470.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!