Letteratura scientifica selezionata sul tema "Cyber defensive"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cyber defensive".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Cyber defensive"

1

Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.

Testo completo
Abstract (sommario):
This paper examines how the distribution of offensive and defensive cyber operations (OCO & DCO) contributes to the achievement of strategic goals. Drawing on established theories of the relationship of offensive and defensive weaponry in terrestrial conflict domains, the examination develops a methodological framework to assess the relative contributions of OCO and DCO to offensive and defensive cyber strategies and overall multi-domain outcomes. The paper identifies both challenges and opportunities in associating offensive and defensive cyber capabilities with appropriate offensive and defensive strategies. Some challenges are intrinsic to the dynamic effects of specific weapons technologies on conflict outcomes, while other challenges flow from the conditions of the cyber domain. The paper identifies principal complicating factors in associating OCO and DCO selections with strategic outcomes, including the dual-use and indistinguishable nature of some of the most sophisticated cyber weapons; the opacity of operations incumbent to the cyber domain; complexities and data acquisition impediments in calculating precise relative costs associated with developing and utilizing offensive and defensive cyber capabilities; information paucity exacerbation of motivated analytical biases; and the sometimes inverted relationship of OCO and DCO to offensive and defensive strategies, respectively. These findings support the importance of developing a precise and empirical evaluation methodology associating objectives achievement in the distribution and balance of OCO and DCO missions to the underlying operational and strategic objectives of those missions.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Duvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.

Testo completo
Abstract (sommario):
While the centrality of cyber power in the safeguarding and advancing nation states’ national interests and objectives is now widely accepted, the academic discourse (on cyber power) is still incipient. In literature reviewed, cyber power is predominantly viewed as comprising of two dimensions, namely offensive and defensive. The exploratory analysis we conducted found that Africa’s unique, contextual factors necessitate an expanded conceptualisation of cyber power. This alternative conceptualisation does not dispute the existing notion that cyber power has offensive and defensive dimensions. The fact that cyber is by its very nature borderless and that African countries function in an interconnected global arena of competition and conflict, are also not contested. What is required is the addition of a third dimension to cyber power, namely developmental power. This paper advances a tentative proposition on a cyber-power triad (with offensive, defensive and developmental dimensions). This proposition, we argue, is more apposite to African countries’ national objectives —strategically and in the allocation of resources. At least on a notional level, the cyber-power triad can guide the leveraging of the asymmetric advantages that cyber space offers African nation states and in a manner that pursues all three (cyber power) dimensions in a complementary manner. Such synergetic wielding of cyber power is one of the keys indispensable to African countries addressing their substantial challenges and unlocking their vast potential.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Lachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.

Testo completo
Abstract (sommario):
Modern civilian and military marine vessels employ integrated platform management systems to monitor and control various different operational ship systems such has engine control, navigation and potentially weapon systems. These platform management systems consist of information and operational technology (IT/OT) environments that integrate commercial operating systems, TCP/IP based protocols and supervisory control and data acquisition (SCADA) systems in order to monitor and control marine cyber physical systems. This integration of technologies introduces threat vectors as well as unique operational, safety and potentially environmental impacts for marine vessels. Ships’ crews do not always have security monitoring capabilities and trained security staff who understand the various onboard systems to the extent they could detect a cyber attack. Furthermore, there is a lack of training environments that could be used to educate marine cyber operators. The aim of this research is to build an environment based on effective cyber training techniques to enable the education of marine cyber operators in defensive cyber operations. The environment in this context is a defensive cyber security trainer that enables students to analyse network traffic in order to detect attacks against any ship systems, including cyber physical systems. Effective training techniques refers to the pedagogical recommendations for successful cyber education and effective gamified design. Educating marine cyber operators how to detect attacks on marine IT/OT environments within an integrated platform management system will enable better protection from cyber attack against marine vessels. To accomplish this aim, defensive cyber trainer was developed that consisted of three key components. The first was a Capture the Flag (CTF) framework. The second was a server that included the emulation and simulation of key ship integrated platform management system components within a virtualized environment. Third, were open source and customized plugins used to analyse traffic in our virtualized ship and the inclusion of three different kill chains based on real attacker tactics, techniques and procedures (TTPs). This defensive cyber trainer was validated against research methodologies for effective gamified environment design.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Awan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Segell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.

Testo completo
Abstract (sommario):
The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional. An escalation in one could lead to an overall escalation in all. In the political areas and, by extension, in civil-military relations (CMR), the IDF has a defensive mode as routine, while an offensive mode is manifest rarely in emergencies and war. The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel’s adversaries do not share the same policies with regular cyber and terror attacks against civilian, government, and military targets. There is consistency in all four threats. Fencing, active defense, and preventive and preemptive strikes dominate.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

ZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.

Testo completo
Abstract (sommario):
The general trends and features of the formation of cyber forces in countries such as Poland and the Czech Republic are determined. The measures devoted to the creation of cyber forces in the mentioned NATO countries have been analyzed. The competence, powers and functional tasks of the practical activities of the responsible cyber units were considered. The peculiarities of the use of cyber troops in the framework of conducting defensive and offensive cyber operations are summarized. Based on the generalization of the positive Polish and Czech experience of creating cyber forces, the prospects of legislative support for the institutional formation of cyber forces in Ukraine are outlined.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Venkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.

Testo completo
Abstract (sommario):
Organizations are now facing more complex cyber threats, prompting them to implement forward-thinking security testing methods to protect their digital systems. The Red Team and Blue Team simulations offer a practical method for evaluating an organization's ability to withstand cyber threats by mimicking actual attacks and the corresponding defensive measures taken in response. These exercises aid in uncovering system weaknesses, boosting threat recognition, and refining incident response capacities. Integrating artificial intelligence-driven threat intelligence, automated security checks, and Zero Trust frameworks enhances overall cybersecurity protection measures. Continuous cyber training exercises enable organizations to stay prepared for evolving threats despite facing obstacles such as resource constraints and adapting attacker strategies, incorporating drills on a regular basis. Simultaneous cooperation between teams employing offensive (Red Team) and defensive (Blue Team) tactics, facilitated by Purple Teaming, strengthens adaptive security systems. Consistent evaluations and security instruction enable companies to remain in front of cyber threats. Structured simulations can be used by businesses to improve and fine-tune their security policies and emergency response procedures. As cyber threats continue to evolve, organizations must give priority to ongoing enhancement and real-time security surveillance. A well-organized cybersecurity strategy guarantees lasting stability in an ever more digital environment.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Zajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.

Testo completo
Abstract (sommario):
This paper examines Five Eyes surveillance programs as a threat to IT (Information Technology) security and IT security as resistance to these programs. I argue that the most significant of Snowden's disclosures have been the Five Eyes agencies’ systematic compromise of the technologies, networks, and standards in use within their own countries and abroad. Attacks on domestic infrastructure contradict the defensive posture of these agencies but are consistent with the project of cyber security as defined by the Five Eyes. The cyber security project of the Five Eyes nations is expansive in scope and has proceeded along dangerous lines. By assigning signals intelligence agencies the dual role of exploiting IT systems as well as securing them, a contradiction has been baked into our evolving notion of cyber security. A comprehensive response should include political and legal reforms, disentangling the Five Eyes' offensive and defensive roles, and narrowing the scope of the cyber security project. However, the most effective forms of resistance for individuals and institutions so far have been through an increased emphasis on IT security practices.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Alothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.

Testo completo
Abstract (sommario):
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incident response. In this research work, we proposed a cyber incident model to handle real-time security attacks in various scenarios. The proposed model consisted of three teams: (1) the black team, (2) the red team, and (3) the blue team. The black team was a group of instructors responsible for setting up the environment. They had to educate the red and blue teams about cyber security and train them on facing cyber attacks. Once the training period was completed, the members were divided into two teams to conduct a cyber-security competition in a cyber game scenario. Each of the two teams performed a different task. The red team was the offensive team that was responsible for launching cyber-security attacks. The blue team was the defensive team that was responsible for countering attacks and minimizing the damage caused by attackers; they had to conduct both cyber-security configuration and incident handling. During the scenario, the black team was responsible for guiding and monitoring both the red and the blue teams, ensuring the rules were applied throughout the competition. At the end of the competition, the members of each team changed with each other to make sure every team member was using the knowledge they gained from the training period and every participant was evaluated impartially. Finally, we showed the security team’s offensive and defensive skills via the red team and the blue team, respectively.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Johnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.

Testo completo
Abstract (sommario):
Cyber attackers commonly operate in teams, which may process information collectively and thus, may be best understood when the team is treated as the unit of analysis. Future research in Oppositional Human Factors (OHF) should consider the impact of team-influencing and team-level biases and the impact that defensive interventions have on team cognition in general. Existing measurement approaches using team interactions may be well suited for studying red teams, and how OHF interventions impact cyber attackers.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Cyber defensive"

1

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Testo completo
Abstract (sommario):
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and computers to see different information within the same PDF documents. This dissertation lastly describes some future work efforts, identifying some potential vulnerabilities in the automated enforcement of copyright protection for audio (particularly music) in online systems such as YouTube.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Wong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.

Testo completo
Abstract (sommario):
With increased dependency on the Internet, cyber attacks are fast becoming an attractive option for state adversaries, in part because of the ease of hiding one's identity. In response, governments around the world are taking measures to improve their national cyber defenses. However, these defenses, which are generally passive in nature, have been insufficient to address the threat. This thesis explores the possibility of employing active cyber defenses to improve cyber defenses at the national level. Active cyber defense refers to the use of offensive actions, such as counter hacking, pre-emptive hacking, etc., to defend against cyber attacks. This thesis studies the typologies of active cyber defense and examines how this approach can enhance a state's cyber defense posture.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Stensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.

Testo completo
Abstract (sommario):
Approved for public release; distribution is unlimited.<br>This thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norways strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control. Norway must increasingly be perceived as a serious and tough player in cyberspace; this requires proactive thinking and offensive capabilities. An important first step would be to make the Ministry of Defense responsible for the nations cyber defense.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.

Testo completo
Abstract (sommario):
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Moran, Daniel ; Denning, Dorothy. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 93-102). Also available in print.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.

Testo completo
Abstract (sommario):
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses of actions by convincing the aggressor that cost exceeds the profit. In cyberspace, where the costs are lower, deterrence is disputed because of the natural interconnectedness and constant actions. The aim of this study is to investigate how the US understands cyber deterrence. This study is motivated by the current ambiguity regarding whether deterrence works in cyberspace or not. Using both theories of conventional and cyber deterrence together with theories of offense and defense, the study focuses on the US since they remain at the center of development regarding cyber deterrence. Through a discourse analysis using Bacchis What´s the problem represented to be approach, the investigation of US policy from 2018 shows that the US has adopted theories of cyber deterrence in their policy. However, the presumptions of the problem presentation have rather descended from theories of conventional deterrence. The solutions implemented indicate that the US has an advantage in cyber offense capabilities, but the study also shows that they are moving towards more defense-oriented capabilities in the future. In the stress of taking action, the US end up interfusing premises and actions which may affect the principle of intervention and thus the security of the American population.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.

Testo completo
Abstract (sommario):
Approved for public release; distribution is unlimited<br>The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber technology, doctrine, and policy differentiate its posture as offensive or defensive? To evaluate Russian cyber capability, this thesis considers two factors—technology and geography—concluding that, although the Russian government is modifying its cyber terrain to improve defensiveness, Russia’s brandished cyber weapons suggest that it pursues offensive capability. To evaluate Russia’s posture differentiation, the thesis examines Russians’ understanding of cyber power, Russian information warfare and hybrid warfare doctrines, and the country’s international engagements, concluding that, although Russia has historically presented its posture as defensive, it is increasingly difficult to make that distinction. Finally, the thesis evaluates this state-level analysis in the broader context of the international system; Russia’s historical aggression and current behavior in cyberspace likely reflects Stephen van Evera’s explanATOry hypothesis for the causes of war—defensive expansion.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.

Testo completo
Abstract (sommario):
With recent advances in electronics and communication technologies, our daily lives are immersed in an environment of Internet-connected smart things. Despite the great convenience brought by the development of these technologies, privacy concerns and security issues are two topics that deserve more attention. On one hand, as smart things continue to grow in their abilities to sense the physical world and capabilities to send information out through the Internet, they have the potential to be used for surveillance of any individuals secretly. Nevertheless, people tend to adopt wearable devices without fully understanding what private information can be inferred and leaked through sensor data. On the other hand, security issues become even more serious and lethal with the world embracing the Internet of Things (IoT). Failures in computing systems are common, however, a failure now in IoT may harm people's lives. As demonstrated in both academic research and industrial practice, a software vulnerability hidden in a smart vehicle may lead to a remote attack that subverts a driver's control of the vehicle. Our approach to the aforementioned challenges starts by understanding privacy leakage in the IoT era and follows with adding defense layers to the IoT system with attackers gaining increasing capabilities. The first question we ask ourselves is "what new privacy concerns do IoT bring". We focus on discovering information leakage beyond people's common sense from even seemingly benign signals. We explore how much private information we can extract by designing information extraction systems. Through our research, we argue for stricter access control on newly coming sensors. After noticing the importance of data collected by IoT, we trace where sensitive data goes. In the IoT era, edge nodes are used to process sensitive data. However, a capable attacker may compromise edge nodes. Our second research focuses on applying trusted hardware to build trust in large-scale networks under this circumstance. The application of trusted hardware protects sensitive data from compromised edge nodes. Nonetheless, if an attacker becomes more powerful and embeds malicious logic into code for trusted hardware during the development phase, he still can secretly steal private data. In our third research, we design a static analyzer for detecting malicious logic hidden inside code for trusted hardware. Other than the privacy concern of data collected, another important aspect of IoT is that it affects the physical world. Our last piece of research work enables a user to verify the continuous execution state of an unmanned vehicle. This way, people can trust the integrity of the past and present state of the unmanned vehicle.<br>Doctor of Philosophy<br>The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.

Testo completo
Abstract (sommario):
Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usability.  Due to the proliferation of increasingly sophisticated cyber threats with exponentially destructive effects, CPS defense systems must systematically evolve their detection, understanding, attribution, and mitigation capabilities. Unfortunately most of the current CPS defense systems fall short to adequately provision defense services while maintaining operational continuity and stability of the targeted CPS applications in presence of advanced persistent attacks. Most of these defense systems use un-coordinated combinations of disparate tools to provision defense services for the cyber and physical components. Such isolation and lack of awareness of and cooperation between defense tools may lead to massive resource waste due to unnecessary redundancy, and potential conflicts that can be utilized by a resourceful attacker to penetrate the system.   <br />Recent research argued against the suitability of the current security solutions to CPS environments.  We assert the need for new defense platforms that effectively and efficiently manage dynamic defense missions and toolsets in real-time with the following goals: <br />1) Achieve asymmetric advantage to CPS defenders, prohibitively increasing the cost for attackers; <br />2) Ensure resilient operations in presence of persistent and evolving attacks and failures; and  <br />3) Facilitate defense alliances, effectively and efficiently diffusing defense intelligence and operations transcending organizational boundaries. <br />Our proposed solution comprehensively addresses the aforementioned goals offering an evolutionary CPS defense system. The presented CPS defense platform, termed CyPhyCARD (Cooperative Autonomous Resilient Defenses for Cyber-Physical systems) presents a unified defense platform to monitor, manage, and control the heterogeneous composition of CPS components. CyPhyCARD relies on three interrelated pillars to construct its defense platform. CyPhyCARD comprehensively integrates these pillars, therefore building a large scale, intrinsically resilient, self- and situation- aware, cooperative, and autonomous defense cloud-like platform that provisions adequate, prompt, and pervasive defense services for large-scale, heterogeneously-composed CPS. The CyPhyCARD pillars are: <br />1) Autonomous management platform (CyberX) for CyPhyCARD\'s foundation. CyberX enables application elasticity and autonomic adaptation to changes by runtime diversity employment, enhances the application resilience against attacks and failures by multimodal recovery mechanism, and enables unified application execution on heterogeneously composed platforms by a smart employment of a fine-grained environment-virtualization technology. <br />2) Diversity management system (ChameleonSoft) built on CyberX. ChameleonSoft encrypts software execution behavior by smart employment of runtime diversity across multiple dimensions to include time, space, and platform heterogeneity inducing a trace-resistant moving-target defense that works on securing CyPhyCARD platform against software attacks. <br />3) Evolutionary Sensory system (EvoSense) built on CyberX. EvoSense realizes pervasive, intrinsically-resilient, situation-aware sense and response system to seamlessly effect biological-immune-system like defense. EvoSense acts as a middle layer between the defense service provider(s) and the Target of Defense (ToD) creating a uniform defense interface that hides ToD\'s scale and heterogeneity concerns from defense-provisioning management.<br />CyPhyCARD is evaluated both qualitatively and quantitatively. The efficacy of the presented approach is assessed qualitatively, through a complex synthetic CPS attack scenario. In addition to the presented scenario, we devised multiple prototype packages for the presented pillars to assess their applicability in real execution environment and applications. Further, the efficacy and the efficiency of the presented approach is comprehensively assessed quantitatively by a set of custom-made simulation packages simulating each CyPhyCARD pillar for performance and security evaluation.  The evaluation illustrated the success of CyPhyCARD and its constructing pillars to efficiently and effectively achieve its design objective with reasonable overhead.<br>Ph. D.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Testo completo
Abstract (sommario):
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a simple design was created to assist in the investigation of the efficiency of the system. Some simple implementations of the existing defensive mechanism were made in order to provide some practical results that were used for the study. The existing defensive mechanism was surveyed and improved upon where possible. The improved defensive mechanism was designed and implemented and its results were compared with the results from the existing defensive mechanism. Due to the fact that the majority of the attackers use defensive mechanisms’ vulnerability in order to find their way into devices such as web servers, it was felt that, even with the most sophisticated improved defensive mechanism in place, it would not be entirely correct to claim that it is possible to fully protect web servers against such attacks.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Cyber defensive"

1

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kott, Alexander, Cliff Wang, and Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Baddi, Youssef, Mohammed Amin Almaiah, Omar Almomani, and Yassine Maleh. The Art of Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781032714806.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Edwards, Dr Jason. Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Vijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kshetri, Naresh, Purnendu Shekhar Pandey, and Mohiuddin Ahmed. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures. CRC Press, 2024. https://doi.org/10.1201/9781003449515.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Rani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "Cyber defensive"

1

Kassab, Hanna Samir. "Cyber-Vulnerability." In Prioritization Theory and Defensive Foreign Policy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-48018-3_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Katagiri, Nori. "Why Defensive Measures Are Too Defensive: Strategy of Denial." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Huang, Linan, and Quanyan Zhu. "Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception." In Autonomous Cyber Deception. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Turtiainen, Hannu, Andrei Costin, and Timo Hämäläinen. "Defensive Machine Learning Methods and the Cyber Defence Chain." In Artificial Intelligence and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Osula, Anna-Maria. "Building Cyber Resilience: The Defensive Shield for the EU." In New Security Challenges. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08384-6_9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Zhao, Jiamiao, Fei Hu, and Xiali Hei. "Defensive Schemes for Cyber Security of Deep Reinforcement Learning." In AI, Machine Learning and Deep Learning. CRC Press, 2023. http://dx.doi.org/10.1201/9781003187158-12.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Manasa, Koppula, and L. M. I. Leo Joseph. "IoT Security Vulnerabilities and Defensive Measures in Industry 4.0." In Artificial Intelligence and Cyber Security in Industry 4.0. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2115-7_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Testo completo
Abstract (sommario):
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the face of defensive deployment of anti-malware AI techniques. This article summarizes the state of the art in AI-enhanced malware and the evasion and attack techniques it uses against AI-supported defensive systems. Our findings include articles describing targeted attacks against AI detection functions, advanced payload obfuscation techniques, evasion of networked communication with AI methods, malware for unsupervised-learning-based cyber-physical sabotage, decentralized botnet control using swarm intelligence and the concealment of malware payloads within neural networks that fulfill other purposes.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hodges, Duncan, and Oliver Buckley. "Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_34.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Cabada, Pavol. "Cyber-Democracy and Cyber-Defense." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_11-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Cyber defensive"

1

Zhao, Zhenqi, Jun Teng, Wenduo Yu, Fan Yang, Linjiang Deng, and Bangpeng He. "Offensive and Defensive Strategy for Distribution Network CPS Considering EV Source-charge Bidirectional." In 2024 Second International Conference on Cyber-Energy Systems and Intelligent Energy (ICCSIE). IEEE, 2024. http://dx.doi.org/10.1109/iccsie61360.2024.10698065.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Cao, Jintao, Allie Null, Marissa Stewart, Suman Bhunia, and Mohammad Salman. "Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity." In 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics. IEEE, 2024. http://dx.doi.org/10.1109/ithings-greencom-cpscom-smartdata-cybermatics62450.2024.00065.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Pavelka, Martin, and Ladislav Hudec. "Countermeasures Management in Cyber Defense Exercises." In 2024 New Trends in Signal Processing (NTSP). IEEE, 2024. http://dx.doi.org/10.23919/ntsp61680.2024.10726308.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Velazquez, Alexander, Johannes F. Loevenich, Tobias Hürten, et al. "Cyber Operations Gyms to Train Autonomous Cyber Defense Agents for NATO." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047884.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Lofy, Cheri, and Mark Vriesenga. "Demystifying Cyber Systems Engineering." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3864.

Testo completo
Abstract (sommario):
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;As the United States’ (US) Department of Defense (DoD) works to maintain our battlefield superiority in the ground domain, we rapidly integrate new electronic capabilities into vehicles that communicate and cooperate over vehicle-to-infrastructure networks. These new capabilities contribute to increasing the potential attack surface, as described in the 2018 Government Accountability Office (GAO) report on Weapon System Cyber Security [&lt;xref rid="R1" ref-type="bibr"&gt;1&lt;/xref&gt;]. To understand the increasingly complex attack surface and to reduce ground platform exposures through cyberspace, we need new engineering analysis and design techniques.&lt;/p&gt; &lt;p&gt;Today, most engineering methodologies treat cybersecurity as an add-on to traditional process flows. For example, until recently, the International Council on Systems Engineering (INCOSE) gave little attention to cybersecurity in their industry definition of the Vee-Model used widely in defense contracting. We argue that until we give cybersecurity first-class status and give it equal importance to the functional requirements, the products and services delivered may have sub-optimal defensive and resilience properties, making them vulnerable to attack through cyberspace.&lt;/p&gt; &lt;p&gt;This paper introduces BAE Systems’ approach to making cybersecurity and resiliency first-class system properties in the engineering process. Our approach, called Cyber Systems Engineering (CSE), combines best practices from Risk Management Framework (RMF) for defensive design and supplementing methods derived from the application of ‘offensive thinking to solve defensive problems.’ We improve cyber readiness and survivability by combining offensive and defensive techniques throughout the engineering lifecycle. We have already applied CSE (in whole and part) on over 50 DoD programs; our combined approach using defensive and offensive skills strengthen as we identify best practices for DoD programs.&lt;/p&gt;
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Mckneely, Jennifer, Tara Sell, Kathleen Straub, and Daniel Thomas. "Defensive Cyber Maneuvers to Disrupt Cyber Attackers." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2023. http://dx.doi.org/10.24251/hicss.2023.814.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Ferguson-Walter, Kimberly, Sunny Fugate, Justin Mauger, and Maxine Major. "Game theory for adaptive defensive cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314063.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Bierbrauer, David, Robert Schabinger, Caleb Carlin, Jonathan Mullin, John Pavlik, and Nathaniel D. Bastian. "Autonomous cyber warfare agents: dynamic reinforcement learning for defensive cyber operations." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, edited by Latasha Solomon and Peter J. Schwartz. SPIE, 2023. http://dx.doi.org/10.1117/12.2663093.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Parker, Thomas, Jeremy Jones, Joshua Mayberry, et al. "Defensive Cyber Operations in a Software-Defined Network." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.688.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Hu, Bing, Longqiang Zhang, Zhiwu Guo, et al. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.

Testo completo
Abstract (sommario):
With the introduction of digital instrumentation system, the cyber security threat to nuclear power plants is becoming more and more serious. The existing cyber security standards of nuclear power plants still need to be improved, and the technology practice of defensive strategies is lacking all over the world. In this paper, based on the comparison of domestic and foreign regulations and standards, combined with the technical practice of I&amp;C system overall plan, a defense-in-depth model based on data flow is proposed. The overall technical requirements, hierarchy, network model, cyber security basic requirements, cyber security interface and protection of digital assets are introduced, the application of the model and the direction of research on cyber security of nuclear power plant are prospected.
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Cyber defensive"

1

Su, Fei, Larisa Saveleva Dovgal, and Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/ttrc4774.

Testo completo
Abstract (sommario):
While the European Union as a collective entity continues to abstain from endorsing an offensive cyber posture, several of its member states have adopted both defensive and offensive activities and capabilities in cyberspace. In doing so, these member states mirror trends in China, Russia and the United States, which seem to possess increasingly similar strategies for balancing defensive and offensive cyber operations. Given this context, EU policy will need to navigate the potential involvement of its member states in offensive operations, while continuing to advocate for a defence-centric strategy that emphasizes cyber resilience. This research policy paper builds on a year and a half of SIPRI research, workshops and publications that explore ways forward for the EU to strengthen its own cybersecurity while contributing to global cyber stability.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Carey, III, and Casimir C. NATO's Options for Defensive Cyber Against Non-State Actors. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592754.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Buchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.

Testo completo
Abstract (sommario):
Machine learning advances are transforming cyber strategy and operations. This necessitates studying national security issues at the intersection of AI and cybersecurity, including offensive and defensive cyber operations, the cybersecurity of AI systems, and the effect of new technologies on global stability.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Lohn, Andrew, Anna Knack, Ant Burke, and Krystal Jackson. Autonomous Cyber Defense. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/2022ca007.

Testo completo
Abstract (sommario):
The current AI-for-cybersecurity paradigm focuses on detection using automated tools, but it has largely neglected holistic autonomous cyber defense systems — ones that can act without human tasking. That is poised to change as tools are proliferating for training reinforcement learning-based AI agents to provide broader autonomous cybersecurity capabilities. The resulting agents are still rudimentary and publications are few, but the current barriers are surmountable and effective agents would be a substantial boon to society.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Hoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca007.

Testo completo
Abstract (sommario):
As states turn to AI to gain an edge in cyber competition, it will change the cat-and-mouse game between cyber attackers and defenders. Embracing machine learning systems for cyber defense could drive more aggressive and destabilizing engagements between states. Wyatt Hoffman writes that cyber competition already has the ingredients needed for escalation to real-world violence, even if these ingredients have yet to come together in the right conditions.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Plantenga, Todd, and Tamara Gibson Kolda. Analytics for Cyber Network Defense. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1113857.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Smith, Randall. Multi-Community Cyber Defense (MCCD). Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408408.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Giles, Keir, and Kim Hartmann. Cyber Defense: An International View. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622264.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Luckinbill, Ryan. Cyber Defense Competition Card Game. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-471.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Colbaugh, Richard, and Kristin L. Glass. Proactive defense for evolving cyber threats. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059470.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!