Articoli di riviste sul tema "Cyber defensive"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cyber defensive".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.
Testo completoDuvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Testo completoLachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.
Testo completoAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Testo completoSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Testo completoZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.
Testo completoVenkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.
Testo completoZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Testo completoAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Testo completoJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Testo completoPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Testo completoHuntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Testo completoAdrian, Dana Austin, Mohammed Tijjani, Shun Chou Te, Dunn Carolyn, and Behm Michael. "A Survey of Social Engineers that did not Collect Enough Data." Engineering and Technology Journal 07, no. 06 (2022): 1270–81. https://doi.org/10.5281/zenodo.6606712.
Testo completoPoornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Testo completoSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine." Analytical papers of the Institute of Europe RAS, no. 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Testo completoMerlino, Jorge C., Mohammed Asiri, and Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids." Sustainability 14, no. 5 (2022): 2730. http://dx.doi.org/10.3390/su14052730.
Testo completoKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems." International Journal of Engineering and Applied Computer Science 02, no. 01 (2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Testo completoFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries." INFORMATION AND LAW, no. 1(48) (March 6, 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Testo completoAmer, Lawrence. "AI in cyber security: A dual perspective on hacker tactics and defensive strategies." Cyber Security: A Peer-Reviewed Journal 8, no. 3 (2025): 198. https://doi.org/10.69554/clxc9075.
Testo completoGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Testo completoKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Testo completoUsman, S. D., S. B. Junaidu, A. A. Obiniyi, and M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward." Scientia Africana 20, no. 3 (2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Testo completoMerz, Terry, and Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Testo completoObioha-Val, Onyinye Agatha, Oluwaseun Oladeji Olaniyi, Michael Olayinka Gbadebo, Adebayo Yusuf Balogun, and Anthony Obulor Olisa. "Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign." Asian Journal of Research in Computer Science 18, no. 1 (2025): 184–204. https://doi.org/10.9734/ajrcos/2025/v18i1557.
Testo completoSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES." Cybersecurity & Cybercrime 1, no. 2 (2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Testo completoThenjiwe Sithole, Jaco Du Toit, and Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Testo completoAshok, Bawge, and Joshi Dr.Harish. "A Review on Cybersecurity Issues and Emerging Trends in Modern Technologies." Journal of Sensor Research and Technologies 7, no. 2 (2025): 34–40. https://doi.org/10.5281/zenodo.15560005.
Testo completoByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson, and Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations." Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Testo completoLegg, Phil, Alan Mills, and Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Testo completoKullman, Kaur, Matt Ryan, and Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations." IFAC-PapersOnLine 52, no. 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Testo completoIlić, Maja. "Cyber security during covid-19 pandemic." Savremene studije bezbednosti, no. 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Testo completoYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Testo completoEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, and Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Testo completoMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law." International Journal of Cyber Warfare and Terrorism 8, no. 1 (2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Testo completoSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Testo completoCzosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Testo completoZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting." Applied and Computational Engineering 38, no. 1 (2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Testo completoMcCune, Jayson, and Dwight A. Haworth. "Securing America Against Cyber War." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Testo completoSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment." International Security 41, no. 3 (2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Testo completoKomaragiri, Sai Gireesh, Sujatha Alla, Teresa Duvall, Saltuk Karahan, Nagesh Bheesetty, and Vijay Kumar Chattu. "A Governance-Centric Framework for Strengthening Healthcare Cybersecurity: A Systems Perspective." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 659–67. https://doi.org/10.34190/iccws.20.1.3374.
Testo completoJain, Jay Kumar, and Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 32 (February 24, 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Testo completoLlamas Covarrubias, Jersain Zadamig. "From Prevention to Resilience." Journal of Information Security and Cybercrimes Research 8, no. 1 (2025): 01–16. https://doi.org/10.26735/vvms1897.
Testo completoDhanaraj, Anandan. "The Evolution of Cyber Threats: From Traditional Attacks to AI-Powered Challenges." European Journal of Computer Science and Information Technology 13, no. 36 (2025): 50–61. https://doi.org/10.37745/ejcsit.2013/vol13n365061.
Testo completoSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Demonstration and Evaluation of Defensive Cyber Operations Decision-Making Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 628–37. https://doi.org/10.34190/eccws.24.1.3540.
Testo completoWu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Testo completoHeryanto, Diky, and Salma Azizah. "APPLICATION OF ACCESS CONTROL LIST FOR NETWORK SECURITY AT CISCO ROUTER AS A FIREWALL." OISAA Journal of Indonesia Emas 2, no. 2 (2019): 71–76. http://dx.doi.org/10.52162/jie.2019.002.02.3.
Testo completoArmstrong, Miriam E., Keith S. Jones, and Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Testo completoVeljković, Sanela. "Possibility of applying the rules of international humanitarian law to cyber warfare." Pravo - teorija i praksa 41, no. 3 (2024): 17–28. http://dx.doi.org/10.5937/ptp2403017v.
Testo completoNejabatkhah, Farzam, Yun Wei Li, Hao Liang, and Rouzbeh Reza Ahrabi. "Cyber-Security of Smart Microgrids: A Survey." Energies 14, no. 1 (2020): 27. http://dx.doi.org/10.3390/en14010027.
Testo completoAzmi, Nor Nashrah, Fiza Abdul Rahim, Noor Hafizah Hassan, and Nur Azfahani Ahmad. "SWOT ANALYSIS OF CYBERSECURITY VULNERABILITIES AND STRATEGIES IN RENEWABLE ENERGY SYSTEM: A CASE STUDY ON EUROPEAN WIND POWER SYSTEM." Malaysian Journal of Sustainable Environment 12, no. 2 (2025): 103–26. https://doi.org/10.24191/myse.v12i2.7072.
Testo completo