Articoli di riviste sul tema "Cyber defensive"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cyber defensive".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Huntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Testo completoGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Testo completoSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Testo completoDuvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Testo completoPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Testo completoAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Testo completoAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Testo completoSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment." International Security 41, no. 3 (2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Testo completoArmstrong, Miriam E., Keith S. Jones, and Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Testo completoMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law." International Journal of Cyber Warfare and Terrorism 8, no. 1 (2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Testo completoHuskaj, Gazmend. "Offensive Cyberspace Operations for Cyber Security." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 476–79. http://dx.doi.org/10.34190/iccws.18.1.1054.
Testo completoKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems." International Journal of Engineering and Applied Computer Science 02, no. 01 (2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Testo completoUsman, S. D., S. B. Junaidu, A. A. Obiniyi, and M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward." Scientia Africana 20, no. 3 (2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Testo completoZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Testo completoJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Testo completoLegg, Phil, Alan Mills, and Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Testo completoByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson, and Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations." Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Testo completoKullman, Kaur, Matt Ryan, and Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations." IFAC-PapersOnLine 52, no. 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Testo completoRaska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change." SIRIUS – Zeitschrift für Strategische Analysen 4, no. 2 (2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.
Testo completoCarroll, Jami. "Agile Methods For Improved Cyber Operations Planning." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 108–15. http://dx.doi.org/10.34190/eccws.22.1.1138.
Testo completoWu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Testo completoPoornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Testo completoFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries." INFORMATION AND LAW, no. 1(48) (March 6, 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Testo completoMerlino, Jorge C., Mohammed Asiri, and Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids." Sustainability 14, no. 5 (2022): 2730. http://dx.doi.org/10.3390/su14052730.
Testo completoSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine." Analytical papers of the Institute of Europe RAS, no. 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Testo completoKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Testo completoWu, Zhijun, Ruochen Dong, and Peng Wang. "Research on Game Theory of Air Traffic Management Cyber Physical System Security." Aerospace 9, no. 8 (2022): 397. http://dx.doi.org/10.3390/aerospace9080397.
Testo completoSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES." Cybersecurity & Cybercrime 1, no. 2 (2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Testo completoThenjiwe Sithole, Jaco Du Toit, and Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Testo completoMerz, Terry, and Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Testo completoS, Mrs Yamuna. "Cloud Computing Based Cyber Defensive with Redundancy and Intruder Detection." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (2019): 1810–15. http://dx.doi.org/10.22214/ijraset.2019.3336.
Testo completoWagner, Neal, Cem Ş. Şahin, Michael Winterrose, et al. "Quantifying the mission impact of network-level cyber defensive mitigations." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 14, no. 3 (2016): 201–16. http://dx.doi.org/10.1177/1548512916662924.
Testo completoKaruna, Prakruthi, Hemant Purohit, Rajesh Ganesan, and Sushil Jajodia. "Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception." IEEE Intelligent Systems 33, no. 5 (2018): 16–25. http://dx.doi.org/10.1109/mis.2018.2877277.
Testo completoLiu, Ning, Qing-Wei Chai, Shangkun Liu, Fanying Meng, and Wei-Min Zheng. "Mixed Strategy Analysis in Attack-Defense Game Model Based on 5G Heterogeneous Network of CPS Using ncPSO." Security and Communication Networks 2022 (November 7, 2022): 1–15. http://dx.doi.org/10.1155/2022/1181398.
Testo completoGrant, Tim. "Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?" European Conference on Cyber Warfare and Security 22, no. 1 (2023): 214–22. http://dx.doi.org/10.34190/eccws.22.1.1089.
Testo completoMangel, Marc, and Jimmie McEver. "Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid." Complexity 2021 (September 6, 2021): 1–19. http://dx.doi.org/10.1155/2021/5584123.
Testo completoGanguli, Chirag, Shishir Kumar Shandilya, Maryna Nehrey, and Myroslav Havryliuk. "Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense." Systems 11, no. 1 (2023): 27. http://dx.doi.org/10.3390/systems11010027.
Testo completoEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, and Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Testo completoYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Testo completoCzosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Testo completoIlić, Maja. "Cyber security during covid-19 pandemic." Savremene studije bezbednosti, no. 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Testo completoSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Testo completoZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting." Applied and Computational Engineering 38, no. 1 (2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Testo completoSzyłkowska, Monika. "Attributes of cyber conflict in the context of armed conflict – an outline of the problem." Przegląd Nauk o Obronności, no. 11 (April 14, 2022): 134–54. http://dx.doi.org/10.37055/pno/148424.
Testo completoMaennel, Kaie, Agnė Brilingaitė, Linas Bukauskas, et al. "A Multidimensional Cyber Defense Exercise: Emphasis on Emotional, Social, and Cognitive Aspects." SAGE Open 13, no. 1 (2023): 215824402311563. http://dx.doi.org/10.1177/21582440231156367.
Testo completoMcCune, Jayson, and Dwight A. Haworth. "Securing America Against Cyber War." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Testo completoGENÇOĞLU, Muharrem Tuncay. "Mathematical Modeling of Cyber Attack and Defense." Bilgisayar Bilimleri ve Teknolojileri Dergisi 3, no. 1 (2022): 10–16. http://dx.doi.org/10.54047/bibted.997908.
Testo completoJain, Jay Kumar, and Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 32 (February 24, 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Testo completoChu, Xiaodong, Yu Yi, Maosen Tang, Haoyi Huang, and Lei Zhang. "Defensive resource allocation for cyber-physical systems in global energy interconnection." IOP Conference Series: Earth and Environmental Science 227 (March 2, 2019): 042002. http://dx.doi.org/10.1088/1755-1315/227/4/042002.
Testo completoTrent, LTC Stoney, Robert Hoffman, Tony Leota, CPT Robert Frost, and MAJ Danielle Gonzalez. "Cyberspace Operations and the People Who Perform Them." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 216–17. http://dx.doi.org/10.1177/1541931213601048.
Testo completo