Segui questo link per vedere altri tipi di pubblicazioni sul tema: Cyber defensive.

Articoli di riviste sul tema "Cyber defensive"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cyber defensive".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.

Testo completo
Abstract (sommario):
This paper examines how the distribution of offensive and defensive cyber operations (OCO & DCO) contributes to the achievement of strategic goals. Drawing on established theories of the relationship of offensive and defensive weaponry in terrestrial conflict domains, the examination develops a methodological framework to assess the relative contributions of OCO and DCO to offensive and defensive cyber strategies and overall multi-domain outcomes. The paper identifies both challenges and opportunities in associating offensive and defensive cyber capabilities with appropriate offensive and
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Duvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.

Testo completo
Abstract (sommario):
While the centrality of cyber power in the safeguarding and advancing nation states’ national interests and objectives is now widely accepted, the academic discourse (on cyber power) is still incipient. In literature reviewed, cyber power is predominantly viewed as comprising of two dimensions, namely offensive and defensive. The exploratory analysis we conducted found that Africa’s unique, contextual factors necessitate an expanded conceptualisation of cyber power. This alternative conceptualisation does not dispute the existing notion that cyber power has offensive and defensive dimensions.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Lachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.

Testo completo
Abstract (sommario):
Modern civilian and military marine vessels employ integrated platform management systems to monitor and control various different operational ship systems such has engine control, navigation and potentially weapon systems. These platform management systems consist of information and operational technology (IT/OT) environments that integrate commercial operating systems, TCP/IP based protocols and supervisory control and data acquisition (SCADA) systems in order to monitor and control marine cyber physical systems. This integration of technologies introduces threat vectors as well as unique op
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Awan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Segell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.

Testo completo
Abstract (sommario):
The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional. An escalation in one could lead to an overall escalation in all. In the political areas and, by extension, in civil-military relations (CMR), the IDF has a defensive mode as routine, while an offensive mode is manifest rarely in emergencies and war. The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel’s adversaries do not share the same policies with regular cyber and terror attacks against
Gli stili APA, Harvard, Vancouver, ISO e altri
6

ZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.

Testo completo
Abstract (sommario):
The general trends and features of the formation of cyber forces in countries such as Poland and the Czech Republic are determined. The measures devoted to the creation of cyber forces in the mentioned NATO countries have been analyzed. The competence, powers and functional tasks of the practical activities of the responsible cyber units were considered. The peculiarities of the use of cyber troops in the framework of conducting defensive and offensive cyber operations are summarized. Based on the generalization of the positive Polish and Czech experience of creating cyber forces, the prospect
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Venkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.

Testo completo
Abstract (sommario):
Organizations are now facing more complex cyber threats, prompting them to implement forward-thinking security testing methods to protect their digital systems. The Red Team and Blue Team simulations offer a practical method for evaluating an organization's ability to withstand cyber threats by mimicking actual attacks and the corresponding defensive measures taken in response. These exercises aid in uncovering system weaknesses, boosting threat recognition, and refining incident response capacities. Integrating artificial intelligence-driven threat intelligence, automated security checks, and
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Zajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.

Testo completo
Abstract (sommario):
This paper examines Five Eyes surveillance programs as a threat to IT (Information Technology) security and IT security as resistance to these programs. I argue that the most significant of Snowden's disclosures have been the Five Eyes agencies’ systematic compromise of the technologies, networks, and standards in use within their own countries and abroad. Attacks on domestic infrastructure contradict the defensive posture of these agencies but are consistent with the project of cyber security as defined by the Five Eyes. The cyber security project of the Five Eyes nations is expansive in scop
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Alothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.

Testo completo
Abstract (sommario):
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incident response. In this research work, we proposed a cyber incident model to handle real-time security attacks in various scenarios. The proposed model consisted of three teams: (1) the black team, (2) the red team, and (3) the blue team. The black team was a group of instructors responsible for setting up the environment. They had to educate the red and b
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Johnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.

Testo completo
Abstract (sommario):
Cyber attackers commonly operate in teams, which may process information collectively and thus, may be best understood when the team is treated as the unit of analysis. Future research in Oppositional Human Factors (OHF) should consider the impact of team-influencing and team-level biases and the impact that defensive interventions have on team cognition in general. Existing measurement approaches using team interactions may be well suited for studying red teams, and how OHF interventions impact cyber attackers.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Pattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.

Testo completo
Abstract (sommario):
AbstractThe cyber realm is increasingly vital to national security, but much of cybersecurity is provided privately. Private firms provide a range of roles, from purely defensive operations to more controversial ones, such as active-cyber defense (ACD) and ‘hacking back’. As with the outsourcing of traditional military and security services to private military and security companies (PMSCs), the reliance on private firms raises the ethical question of to what extent the private sector should be involved in providing security services. In this article, I consider this question. I argue that a m
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Huntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.

Testo completo
Abstract (sommario):
The study of cyber strategy and its implications for international security has become increasingly crucial, necessitating an examination of the unique challenges posed by the dynamic and stealthy nature of the cyber domain. This paper addresses whether offensive or defensive strategies prevail in cyberspace, especially in light of evolving technological landscapes and debates over cyber threats. By applying offense-defense theory from international relations, the research explores the nuanced relationship between offensive and defensive operations in cyberspace. Despite prevalent views favori
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Adrian, Dana Austin, Mohammed Tijjani, Shun Chou Te, Dunn Carolyn, and Behm Michael. "A Survey of Social Engineers that did not Collect Enough Data." Engineering and Technology Journal 07, no. 06 (2022): 1270–81. https://doi.org/10.5281/zenodo.6606712.

Testo completo
Abstract (sommario):
In The context of Information technology and Cyber Security a nexus of computers and humans occurs as Social engineering.  Defenders would like to know how this group interacts with users to gain access to secure information.  The purpose of this research initially was to find out from Social Engineers what were the best defensive techniques.  A survey was created to ask social engineers about specific defensive techniques that are prevalent in Cyber security.  Not enough data was collected from social engineers and the second half of the paper covers why this was. One of t
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Poornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.

Testo completo
Abstract (sommario):
The Indian armed forces today face a significant threat of cyberattacks, particularly from hostile neighbouring states like China and Pakistan. Cyberattacks could potentially damage or cripple critical weapons platforms, major communications and ISR (intelligence, surveillance, and reconnaissance) systems, and vital infrastructure, undermining the military’s preparedness and war-fighting capabilities. How prepared is the Indian military to neutralise cyberattacks from adversaries such as China and Pakistan? This is the central question that this article attempts to address. The article contend
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Sharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine." Analytical papers of the Institute of Europe RAS, no. 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.

Testo completo
Abstract (sommario):
The unfolding conflict between Russia, Ukraine and NATO includes offensive and defensive cyberoperations. The author investigates doctrinal and organizational aspects of the use of military cyber capabilities in the conflict.
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Merlino, Jorge C., Mohammed Asiri, and Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids." Sustainability 14, no. 5 (2022): 2730. http://dx.doi.org/10.3390/su14052730.

Testo completo
Abstract (sommario):
The smart grid (SG) offers potential benefits for utilities, electric generators, and customers alike. However, the prevalence of cyber-attacks targeting the SG emphasizes its dark side. In particular, distributed denial-of-service (DDoS) attacks can affect the communication of different devices, interrupting the SG’s operation. This could have profound implications for the power system, including area blackouts. The problem is that few operational technology tools provide reflective DDoS protection. Furthermore, such tools often fail to classify the types of attacks that have occurred. Defens
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Kim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems." International Journal of Engineering and Applied Computer Science 02, no. 01 (2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

FEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries." INFORMATION AND LAW, no. 1(48) (March 6, 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.

Testo completo
Abstract (sommario):
The general trends of the institutional development of cybertroops (cyber forces) in certain NATO countries (Great Britain, the USA) are determined. Regulatory documents, devoted to the formation of cybertroops in these NATO member countries have been analyzed. The competence, powers and functional tasks of practical activities of cyber units are considered. The content and significance of the cognitive effect doctrine and the consequences of its use are outlined. The peculiarities of the use of cyber troops in the framework of conducting defensive and offensive cyber operations are summarized
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Amer, Lawrence. "AI in cyber security: A dual perspective on hacker tactics and defensive strategies." Cyber Security: A Peer-Reviewed Journal 8, no. 3 (2025): 198. https://doi.org/10.69554/clxc9075.

Testo completo
Abstract (sommario):
The use of artificial intelligence (AI) in cyber security has significantly changed the dynamics of warfare, ushering in an era in the continuous battle between those launching attacks and those defending against them. This paper presents an analysis of the impact of AI on cyber security, examining its role from a defensive standpoint. It begins by investigating how cybercriminals harness AI to enhance their capabilities. Cutting-edge machine learning (ML) algorithms empower the development of targeted and stealth attacks, using tactics ranging from AI-driven social engineering strategies to m
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Galinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.

Testo completo
Abstract (sommario):
Cyber security encompasses a broad range of practices, tools and concepts related closely to those of information and operational technology security. Cyber security is distinctive in its inclusion of the offensive use of information technology to attack adversaries. Use of the term cyber security as a key challenge and a synonym for information security or IT security misleads customers and security practitioners and obscures critical differences between these disciplines. Recommendation for security leaders is that they should use the term cyber security to designate only security practices
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Kantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.

Testo completo
Abstract (sommario):
Russian approach to warfighting includes an informational facet. Western hemisphere usually treats cyber activity as a tool similar to traditional warfighting tools such as rifles, artillery and tanks, whereas the Russian approach has an informational and narrative stance to the whole conflict. Placing information in the focus, switches the cyber activity to serve either an informational-psychological or an informational-technical approach. Examining the activity from this non-conventional trait and correlating it to other activities during the execution, the study highlights the coordination
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Usman, S. D., S. B. Junaidu, A. A. Obiniyi, and M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward." Scientia Africana 20, no. 3 (2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.

Testo completo
Abstract (sommario):
With two years having passed since the infamous cyber conflict between Estonia and Russia, on 08 May 2009 international society still lacks a coherent set of principles, rules, and norms governing state security and military operations in cyberspace. For parties committed to promoting the cause of peace and stability in a multipolar world, this is a troubling notion since history shows that the likelihood of a new arms race is high when disruptive technologies dramatically alter the means and methods of war. As more nations aspire to project national power in cyberspace, a new digital arms rac
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Merz, Terry, and Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.

Testo completo
Abstract (sommario):
This paper discusses an in-progress study involving the use of deep reinforcement learning (DRL) to mitigate the effects of an advanced cyber-attack against industrial control systems (ICS). The research is a qualitative, exploratory study which emerged as a gap during the execution of two rapid prototyping studies. During these studies, cyber defensive procedures, known as “Mitigation, were characterized as actions taken to minimize the impact of ongoing advanced cyber-attacks against an ICS while enabling primary operations to continue. To execute Mitigation procedures, affected ICS componen
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Obioha-Val, Onyinye Agatha, Oluwaseun Oladeji Olaniyi, Michael Olayinka Gbadebo, Adebayo Yusuf Balogun, and Anthony Obulor Olisa. "Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign." Asian Journal of Research in Computer Science 18, no. 1 (2025): 184–204. https://doi.org/10.9734/ajrcos/2025/v18i1557.

Testo completo
Abstract (sommario):
This study investigates the transformative role of artificial intelligence (AI) in state-sponsored cyber espionage, focusing on its dual use in offensive and defensive operations. Using data from the MITRE ATT&CK Framework, FireEye APT Groups Database, UNSW-NB15 Intrusion Detection Dataset, and the Cyber Conflict Tracker by CFR, this research applied network graph analysis, multi-criteria decision analysis (MCDA), ensemble classification models, and Difference-in-Differences (DiD) analysis. Results revealed that AI-driven offensive techniques, phishing (degree centrality 0.85), and adaptiv
Gli stili APA, Harvard, Vancouver, ISO e altri
25

SMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES." Cybersecurity & Cybercrime 1, no. 2 (2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.

Testo completo
Abstract (sommario):
The purpose of the article is to show the most important attacks from North Korea and theiroffensive and defensive capabilities. The structure of cyber organizations and their operations arepresented. Nowadays North Korea is seen head on as a military threat, the work aims to presenttheir potential cyber capabilities and the attacks they have made. The beginning of the workdescribes issues related to the organization of the structures, their structure, role and purpose. Thenext section presents the most interesting attacks related to spying and information extraction,cyber-terrorism operations
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Thenjiwe Sithole, Jaco Du Toit, and Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.

Testo completo
Abstract (sommario):
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute and innovative in their techniques and operations globally. These intensifying cyber risks and incidents suggest that cyber capability is inversely proportional to cyber risks, threats and attacks. Therefore, this confirms an emergent and critical need to adopt and invest in intelligence strategies, predominantly cyber counterintelligence (CCI), which is a multi-disciplinary and pro
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Ashok, Bawge, and Joshi Dr.Harish. "A Review on Cybersecurity Issues and Emerging Trends in Modern Technologies." Journal of Sensor Research and Technologies 7, no. 2 (2025): 34–40. https://doi.org/10.5281/zenodo.15560005.

Testo completo
Abstract (sommario):
<em>Cybersecurity has become essential in today&rsquo;s digital landscape, where securing data is a significant challenge. With the rising instances of cybercrime, both governments and private organizations are deploying extensive measures to mitigate these threats. However, cybersecurity remains a pressing concern, particularly with the advent of new technologies. This paper highlights the key issues faced in cybersecurity, discusses emerging technological trends, examines cyber ethics, and explores various defensive techniques.</em>
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Byrne, D. J., David Morgan, Kymie Tan, Bryan Johnson, and Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations." Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Legg, Phil, Alan Mills, and Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.

Testo completo
Abstract (sommario):
Computer Science as a subject is now appearing in more school curricula for GCSE and A level, with a growing demand for cyber security to be embedded within this teaching. Yet, teachers face challenges with limited time and resource for preparing practical materials to effectively convey the subject matter. We hosted a series of workshops designed to understand the challenges that teachers face in delivering cyber security education. We then worked with teachers to co-create practical learning resources that could be further developed as tailored lesson plans, as required for their students. I
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Kullman, Kaur, Matt Ryan, and Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations." IFAC-PapersOnLine 52, no. 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Ilić, Maja. "Cyber security during covid-19 pandemic." Savremene studije bezbednosti, no. 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.

Testo completo
Abstract (sommario):
The covid-19 pandemic has had a profound impact on the world, including exacerbating cybersecurity threats. This paper explores the various types of cyberattacks that emerged during the pandemic, the organizations that were targeted, and the methods employed by attackers. A particular focus is placed on attacks directed at healthcare organizations, which were particularly vulnerable due to the increased demand for their services. The paper also discusses defensive strategies and preventive measures that can be taken to mitigate cyberattacks, as well as the importance of organizational resilien
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.

Testo completo
Abstract (sommario):
With the rising cyber-physical power systems and emerging danger of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber communications can be broken to cause material damage. Therefore, adjustment needs to be made in the present control scheme plan methods to moderate the impact of possible attacks on service quality. This paper, focuses on the service of synchronized source-load contribution in main frequency regulation, a weakness study is performed with model the attack intrusion process, and the risk review of the serv
Gli stili APA, Harvard, Vancouver, ISO e altri
33

El Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, and Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.

Testo completo
Abstract (sommario):
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and capabilities. Cyber threat actors’ advanced techniques necessitate a proactive approach to managing organizations’ risks and safeguarding cyberspace. Cyber risk management is one of the most efficient measures to anticipate cyber threats. However, it often relies on organizations’ contexts and overlooks adversaries, their motives, capabilities,
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Mali, Prashant. "Defining Cyber Weapon in Context of Technology and Law." International Journal of Cyber Warfare and Terrorism 8, no. 1 (2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.

Testo completo
Abstract (sommario):
This article describes how the interconnected world of today, or the cyber space so often called, is easily accessible through a wide array of devices and has an impact and reach beyond geo-political boundaries Owing to high levels of connectivity and the nature of E-governance activities today, the cyber space is rapidly becoming a potential global battlefield for cyber warfare among various state and non-state entities. An effective cyber weapon in this space is like an indicator of cyber power, its nature being offensive or defensive. Parameters of effectiveness and reliability range from t
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Sarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.

Testo completo
Abstract (sommario):
Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned path because of extensive adversary influence, challenging an already complex decision-making environment. Decision-making models have been extensively studied from perspectives of military operations and business management, but they are not sufficiently researched in the context of cyber. This paper responds to this need by examining the decision-making models of DCO leaders
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Czosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.

Testo completo
Abstract (sommario):
Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding of conflict and warfare due to their different characteristics: cyber weapons. This article explores the crucial differences between the conventional weapon and cyber weapon domains, starting a debate as
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Zhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting." Applied and Computational Engineering 38, no. 1 (2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.

Testo completo
Abstract (sommario):
The Cyber Kill Chain is a strategic model that outlines the stages of a cyberattack, from initial reconnaissance to achieving the final objective. This framework is often mirrored in penetration testing (pentest), a legal and authorized simulated attack on a computer system performed to evaluate its security. By understanding the steps in the Cyber Kill Chain, penetration testers can mimic the strategies of malicious attackers, exploring vulnerabilities at each stage of the chain. This approach allows organizations to evaluate their defensive measures across the full spectrum of an attack, ide
Gli stili APA, Harvard, Vancouver, ISO e altri
38

McCune, Jayson, and Dwight A. Haworth. "Securing America Against Cyber War." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.

Testo completo
Abstract (sommario):
This paper expands on one aspect of Clarke and Knake’s (2010) recommendation for defending the United States’ Internet infrastructure from external attack. First it summarizes the threat that has been demonstrated in the recent past. Included are a number of data compromises that have been traced to servers in China. Also identified are potential physical attacks against facilities that employ supervisory control networks, with the Stuxnet virus being a recent example. Lastly, the fact that malware has been planted on computers in the electric power grid for later use makes an ability to block
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment." International Security 41, no. 3 (2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.

Testo completo
Abstract (sommario):
Most scholars and policymakers claim that cyberspace favors the offense; a minority of scholars disagree. Sweeping claims about the offense-defense balance in cyberspace are misguided because the balance can be assessed only with respect to specific organizational skills and technologies. The balance is defined in dyadic terms, that is, the value less the costs of offensive operations and the value less the costs of defensive operations. The costs of cyber operations are shaped primarily by the organizational skills needed to create and manage complex information technology efficiently. The cu
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Komaragiri, Sai Gireesh, Sujatha Alla, Teresa Duvall, Saltuk Karahan, Nagesh Bheesetty, and Vijay Kumar Chattu. "A Governance-Centric Framework for Strengthening Healthcare Cybersecurity: A Systems Perspective." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 659–67. https://doi.org/10.34190/iccws.20.1.3374.

Testo completo
Abstract (sommario):
Healthcare systems face unprecedented security and privacy challenges due to increasing digitization and interconnectedness. This paper provides a comprehensive analysis of these challenges by examining various cyberattacks, defensive mechanisms, and governance frameworks within modern healthcare infrastructure. The research systematically categorizes prevalent security threats, such as ransomware, insider threats, and data breaches, identifying vulnerabilities specific to healthcare systems. Furthermore, the study evaluates current defensive strategies, including encryption techniques, access
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Jain, Jay Kumar, and Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 32 (February 24, 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.

Testo completo
Abstract (sommario):
An intrusion detection system, often known as IDS, is a piece of equipment or a piece of software that monitors a network or collection of devices in order to search for indications of possible intrusion. The frequency of cyber assaults has grown in recent years, and with it, the damage they do to society. The study of cyber security and the avoidance of cyber assaults, such as the use of intrusion detection as a defensive mechanism, is therefore needed. The internet services are widely used. Services based on computers, the internet, and other forms of technology are all considered part of th
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Llamas Covarrubias, Jersain Zadamig. "From Prevention to Resilience." Journal of Information Security and Cybercrimes Research 8, no. 1 (2025): 01–16. https://doi.org/10.26735/vvms1897.

Testo completo
Abstract (sommario):
Cyber threats continue to outpace conventional defense strategies, underscoring the need for more adaptive security approaches. This study examines how six principal European Union frameworks, including the Network and Information Security Directive (NIS2) and the Digital Operational Resilience Act (DORA), align with modern operational tactics: Redirect, Obviate, Impede, Detect, Limit, and Expose. Using a structured qualitative methodology, including legislative text analysis and cross-referencing with real-world incidents, the research maps each regulation’s provisions to specific defensive f
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Dhanaraj, Anandan. "The Evolution of Cyber Threats: From Traditional Attacks to AI-Powered Challenges." European Journal of Computer Science and Information Technology 13, no. 36 (2025): 50–61. https://doi.org/10.37745/ejcsit.2013/vol13n365061.

Testo completo
Abstract (sommario):
The contemporary cybersecurity landscape has transformed into an increasingly complex battleground where traditional defense mechanisms face unprecedented challenges from evolving threat vectors. This comprehensive analysis examines the dramatic evolution of cyber-attacks, highlighting the integration of artificial intelligence as a transformative force that has fundamentally altered attack strategies and effectiveness. The article explores the expanding attack surface through mobile vulnerabilities and emerging quantum computing threats, quantifies the staggering financial impact of cybercrim
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Sarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Demonstration and Evaluation of Defensive Cyber Operations Decision-Making Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 628–37. https://doi.org/10.34190/eccws.24.1.3540.

Testo completo
Abstract (sommario):
As technology has evolved, the world has become more dependent on digital services. Businesses are digitalizing their core processes to better match their clients’ needs and critical infrastructure providers are seeking performance improvements from digitalization. When assets are digital, cybercriminals and nation-states are increasing their offensive activities in the cyber domain. As a result of this, cyberattacks are growing in complexity and speed, forcing defenders to advance in their capabilities to respond to these threats. One key element in developing defensive capabilities is to und
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Wu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (2019): 991. http://dx.doi.org/10.3390/electronics8090991.

Testo completo
Abstract (sommario):
Communication-based train controls (CBTC) systems play a major role in urban rail transportation. As CBTC systems are no longer isolated from the outside world but use other networks to increase efficiency and improve productivity, they are exposed to huge cyber threats. This paper proposes a generalized stochastic Petri net (GSPN) model to capture dynamic interaction between the attacker and the defender to evaluate the security of CBTC systems. Depending on the characteristics of the system and attack–defense methods, we divided our model into two phases: penetration and disruption. In each
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Heryanto, Diky, and Salma Azizah. "APPLICATION OF ACCESS CONTROL LIST FOR NETWORK SECURITY AT CISCO ROUTER AS A FIREWALL." OISAA Journal of Indonesia Emas 2, no. 2 (2019): 71–76. http://dx.doi.org/10.52162/jie.2019.002.02.3.

Testo completo
Abstract (sommario):
The provision limiting access to network users is one of the defensive action system from cyber attacks that can occur through a network connected to the user. Installation ACL device the router can be a firewall, where each incoming and outgoing packets will be matched with a list of existing entries, and then will proceed preconfigured actions.
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Armstrong, Miriam E., Keith S. Jones, and Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.

Testo completo
Abstract (sommario):
Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) an
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Veljković, Sanela. "Possibility of applying the rules of international humanitarian law to cyber warfare." Pravo - teorija i praksa 41, no. 3 (2024): 17–28. http://dx.doi.org/10.5937/ptp2403017v.

Testo completo
Abstract (sommario):
Cyber warfare represents a new form of conflict in today's world. Unlike earlier traditional armed conflicts, cyber warfare is different in terms of means, methods, techniques, and actors. Cyber warfare takes place in virtual space through the use of information and communication technologies. The actors may be states, but also individuals who can inflict significant damage on their opponents. The consequences of cyber attacks may not be immediately apparent, but can manifest much later. Similarly, the outcome of a cyber attack can be material damage or the loss of human life. Since cyber oper
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Nejabatkhah, Farzam, Yun Wei Li, Hao Liang, and Rouzbeh Reza Ahrabi. "Cyber-Security of Smart Microgrids: A Survey." Energies 14, no. 1 (2020): 27. http://dx.doi.org/10.3390/en14010027.

Testo completo
Abstract (sommario):
In this paper, the cyber-security of smart microgrids is thoroughly discussed. In smart grids, the cyber system and physical process are tightly coupled. Due to the cyber system’s vulnerabilities, any cyber incidents can have economic and physical impacts on their operations. In power electronics-intensive smart microgrids, cyber-attacks can have much more harmful and devastating effects on their operation and stability due to low inertia, especially in islanded operation. In this paper, the cyber–physical systems in smart microgrids are briefly studied. Then, the cyber-attacks on data availab
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Azmi, Nor Nashrah, Fiza Abdul Rahim, Noor Hafizah Hassan, and Nur Azfahani Ahmad. "SWOT ANALYSIS OF CYBERSECURITY VULNERABILITIES AND STRATEGIES IN RENEWABLE ENERGY SYSTEM: A CASE STUDY ON EUROPEAN WIND POWER SYSTEM." Malaysian Journal of Sustainable Environment 12, no. 2 (2025): 103–26. https://doi.org/10.24191/myse.v12i2.7072.

Testo completo
Abstract (sommario):
As smart cities increasingly incorporate renewable energy systems to achieve sustainability objectives, ensuring strong cyber security measures is crucial. The susceptibility of these infrastructures, such as smart grids and solar panels, to diverse cyber threats poses significant risks to energy supply and data integrity. This paper examines cyber resilience in the context of the renewable energy industry, using a SWOT analysis of a European wind energy case study to assess the sector's cybersecurity posture and identify key vulnerabilities. This paper aims to identify the industry's current
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!