Letteratura scientifica selezionata sul tema "Cyber defensive"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cyber defensive".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Cyber defensive"
Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.
Testo completoDuvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Testo completoLachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.
Testo completoAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Testo completoSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Testo completoZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.
Testo completoVenkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.
Testo completoZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Testo completoAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Testo completoJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Testo completoTesi sul tema "Cyber defensive"
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Testo completoWong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.
Testo completoStensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.
Testo completoCloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.
Testo completoOdhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Testo completoSushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.
Testo completoMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Testo completoZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Testo completoAzab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Testo completoNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Testo completoLibri sul tema "Cyber defensive"
Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.
Testo completoCarayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.
Testo completoKott, Alexander, Cliff Wang, and Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.
Testo completoBaddi, Youssef, Mohammed Amin Almaiah, Omar Almomani, and Yassine Maleh. The Art of Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781032714806.
Testo completoKott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.
Testo completoEdwards, Dr Jason. Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6.
Testo completoJajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.
Testo completoVijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.
Testo completoKshetri, Naresh, Purnendu Shekhar Pandey, and Mohiuddin Ahmed. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures. CRC Press, 2024. https://doi.org/10.1201/9781003449515.
Testo completoRani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.
Testo completoCapitoli di libri sul tema "Cyber defensive"
Kassab, Hanna Samir. "Cyber-Vulnerability." In Prioritization Theory and Defensive Foreign Policy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-48018-3_7.
Testo completoKatagiri, Nori. "Why Defensive Measures Are Too Defensive: Strategy of Denial." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_3.
Testo completoHuang, Linan, and Quanyan Zhu. "Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception." In Autonomous Cyber Deception. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_5.
Testo completoTurtiainen, Hannu, Andrei Costin, and Timo Hämäläinen. "Defensive Machine Learning Methods and the Cyber Defence Chain." In Artificial Intelligence and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_7.
Testo completoOsula, Anna-Maria. "Building Cyber Resilience: The Defensive Shield for the EU." In New Security Challenges. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08384-6_9.
Testo completoZhao, Jiamiao, Fei Hu, and Xiali Hei. "Defensive Schemes for Cyber Security of Deep Reinforcement Learning." In AI, Machine Learning and Deep Learning. CRC Press, 2023. http://dx.doi.org/10.1201/9781003187158-12.
Testo completoManasa, Koppula, and L. M. I. Leo Joseph. "IoT Security Vulnerabilities and Defensive Measures in Industry 4.0." In Artificial Intelligence and Cyber Security in Industry 4.0. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2115-7_4.
Testo completoFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Testo completoHodges, Duncan, and Oliver Buckley. "Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_34.
Testo completoCabada, Pavol. "Cyber-Democracy and Cyber-Defense." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_11-1.
Testo completoAtti di convegni sul tema "Cyber defensive"
Zhao, Zhenqi, Jun Teng, Wenduo Yu, Fan Yang, Linjiang Deng, and Bangpeng He. "Offensive and Defensive Strategy for Distribution Network CPS Considering EV Source-charge Bidirectional." In 2024 Second International Conference on Cyber-Energy Systems and Intelligent Energy (ICCSIE). IEEE, 2024. http://dx.doi.org/10.1109/iccsie61360.2024.10698065.
Testo completoCao, Jintao, Allie Null, Marissa Stewart, Suman Bhunia, and Mohammad Salman. "Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity." In 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics. IEEE, 2024. http://dx.doi.org/10.1109/ithings-greencom-cpscom-smartdata-cybermatics62450.2024.00065.
Testo completoPavelka, Martin, and Ladislav Hudec. "Countermeasures Management in Cyber Defense Exercises." In 2024 New Trends in Signal Processing (NTSP). IEEE, 2024. http://dx.doi.org/10.23919/ntsp61680.2024.10726308.
Testo completoVelazquez, Alexander, Johannes F. Loevenich, Tobias Hürten, et al. "Cyber Operations Gyms to Train Autonomous Cyber Defense Agents for NATO." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047884.
Testo completoLofy, Cheri, and Mark Vriesenga. "Demystifying Cyber Systems Engineering." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3864.
Testo completoMckneely, Jennifer, Tara Sell, Kathleen Straub, and Daniel Thomas. "Defensive Cyber Maneuvers to Disrupt Cyber Attackers." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2023. http://dx.doi.org/10.24251/hicss.2023.814.
Testo completoFerguson-Walter, Kimberly, Sunny Fugate, Justin Mauger, and Maxine Major. "Game theory for adaptive defensive cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314063.
Testo completoBierbrauer, David, Robert Schabinger, Caleb Carlin, Jonathan Mullin, John Pavlik, and Nathaniel D. Bastian. "Autonomous cyber warfare agents: dynamic reinforcement learning for defensive cyber operations." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, edited by Latasha Solomon and Peter J. Schwartz. SPIE, 2023. http://dx.doi.org/10.1117/12.2663093.
Testo completoParker, Thomas, Jeremy Jones, Joshua Mayberry, et al. "Defensive Cyber Operations in a Software-Defined Network." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.688.
Testo completoHu, Bing, Longqiang Zhang, Zhiwu Guo, et al. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.
Testo completoRapporti di organizzazioni sul tema "Cyber defensive"
Su, Fei, Larisa Saveleva Dovgal, and Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/ttrc4774.
Testo completoCarey, III, and Casimir C. NATO's Options for Defensive Cyber Against Non-State Actors. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592754.
Testo completoBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.
Testo completoLohn, Andrew, Anna Knack, Ant Burke, and Krystal Jackson. Autonomous Cyber Defense. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/2022ca007.
Testo completoHoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca007.
Testo completoPlantenga, Todd, and Tamara Gibson Kolda. Analytics for Cyber Network Defense. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1113857.
Testo completoSmith, Randall. Multi-Community Cyber Defense (MCCD). Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408408.
Testo completoGiles, Keir, and Kim Hartmann. Cyber Defense: An International View. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622264.
Testo completoLuckinbill, Ryan. Cyber Defense Competition Card Game. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-471.
Testo completoColbaugh, Richard, and Kristin L. Glass. Proactive defense for evolving cyber threats. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059470.
Testo completo