Gotowa bibliografia na temat „State cyberattacks”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „State cyberattacks”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "State cyberattacks":

1

Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective". European Conference on Cyber Warfare and Security 21, nr 1 (8.06.2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Over the years cybersecurity threats to and cyberattacks on the critical infrastructure by state and non-state actors have escalated in intensity and sophistication. Cyberattacks, such as the 2017 NotPetya ransomware attack, the 2020 SolarWinds software supply chain attack and the 2021 Colonial Pipeline ransomware attack, illustrate the vulnerability of critical infrastructure to cyberattacks. Most cyberattacks are committed across borders involving criminal hackers or state supported hackers. Furthermore, critical infrastructure is increasingly interconnected and interdependent. Connectivity brings about the risk of a cyberattack, demonstrated by the 2021 Colonial Pipeline ransomware attack. Interconnectedness also means that the compromise of one critical infrastructure asset can have a domino effect that degrades or disrupts others and results in cascading consequences across the economy and national security. Operational continuity is essential and this may have been one of the reasons why Colonial Pipeline paid a ransom to cyber-attackers. A cyberattack on the critical infrastructure of a state cannot be seen in isolation as the consequences of the attack may impact other states, this was illustrated by the 2017 WannaCry and NotPetya ransomware attacks. The level of sophistication of cyberattacks has increased over the years as shown by the 2020 SolarWinds software supply chain attack. The escalation of attacks has served as a catalyst for governments to address the risk to critical infrastructure. Countries need to have strong government bodies which supervise cybersecurity in their country and work together with their counterparts in other countries by sharing information regarding threats and attacks against critical infrastructure. The discussion focuses on the challenges that threats to and attacks on critical infrastructure present, the possible solutions a government may implement in addressing cyberattacks on critical infrastructure and the accountability of state and non-state actors of cyberattacks on critical infrastructure. The issues are discussed from a legal perspective.
2

Nizovtsev, Yuriy Yu, Andrii M. Lyseiuk i Mykhailo Kelman. "From self-affirmation to national security threat". Revista Científica General José María Córdova 20, nr 38 (1.04.2022): 355–70. http://dx.doi.org/10.21830/19006586.905.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment.
3

Annef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA". Sriwijaya Journal of International Relations 1, nr 1 (28.06.2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Several policies made by country during pandemic related to restriction and prohibition of public mobility implicated to cyberspace activities. Internet Users in Indonesia increased significantly by 17% in 2020 compared to 2019. Internet Users escalation during pandemic reciprocal with the rise of cyberattacks. By using qualitative methods, this paper aims to explain the phenomenon using two approaches, non-traditional security and cybersecurity. The author's findings show that cyberattacks in Indonesia elevated by 5 times in 2020. Some of these cyberattacks include phishing emails, ransomware and disinformation. These cyberattacks potentially threaten human security in various sectors such as personal, community, health, and economic security. Author also tries to elaborate the cyberattack with the National Cyber and Crypto Agency’s (BSSN) responses as a state entity.
4

KOLOSOK, Irina N., i Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods". Elektrichestvo 6, nr 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
The hardware and software tools of the data acquisition and processing systems, as well as the state estimation procedure intended to support the actions of dispatching personnel in performing operational and emergency control of electric power systems (EPS), are critically important components of the EPS information and communication subsystem, but at the same time, they are most vulnerable to cyberattacks. To reduce the extent to which cyberattacks can affect the control quality, it is proposed to use statistical methods for processing measurement information. First of all, these are static and dynamic state estimation methods, including a procedure for verifying measurements or detecting bad data. An analysis of data quality can determine the type of cyberattack undertaken and identify overlooked vulnerabilities. The article presents the findings from a study of two most commonly used bad data detection methods: the a priori method for analyzing the residuals of test equations and the a posteriori method for analyzing the weighted estimation residuals to identify data distorted as a consequence of specially generated cyberattacks. An algorithm to detect erroneous measurements that appear during cyberattacks and are not identified by conventional measurement verification methods in performing EPS state estimation is proposed
5

Khattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng i Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems". Transportation Research Record: Journal of the Transportation Research Board 2672, nr 19 (22.07.2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Active traffic management (ATM) systems have been introduced by transportation agencies to manage recurrent and non-recurrent congestion. ATM systems rely on the interconnectivity of components made possible by wired and/or wireless networks. Unfortunately, this connectivity that supports ATM systems also provides potential system access points that results in vulnerability to cyberattacks. This is becoming more pronounced as ATM systems begin to integrate Internet of Things (IoT) devices. Hence, there is a need to rigorously evaluate ATM systems for cyberattack vulnerabilities, and explore design concepts that provide stability and graceful degradation in the face of cyberattacks. In this research, a prototype ATM system along with a real-time cyberattack monitoring system were developed for a 1.5-mile section of I-66 in Northern Virginia. The monitoring system detects deviation from expected operation of an ATM system by comparing lane control states generated by the ATM system with lane control states deemed most likely by the monitoring system. This comparison provides the functionality to continuously monitor the system for abnormalities that would result from a cyberattack. In the case of any deviation between two sets of states, the monitoring system displays the lane control states generated by the back-up data source. In a simulation experiment, the prototype ATM system and cyberattack monitoring system were subject to emulated cyberattacks. The evaluation results showed that the ATM system, when operating properly in the absence of attacks, improved average vehicle speed in the system to 60 mph (a 13% increase compared to the baseline case without ATM). However, when subject to cyberattack, the mean speed reduced by 15% compared to the case with the ATM system and was similar to the baseline case. This illustrates that the effectiveness of the ATM system was negated by cyberattacks. The monitoring system allowed the ATM system to revert to an expected state with a mean speed of 59 mph and reduced the negative impact of cyberattacks. These results illustrate the need to revisit ATM system design concepts as a means to protect against cyberattacks in addition to traditional system intrusion prevention approaches.
6

Górka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries". Politics in Central Europe 18, nr 3 (1.09.2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Abstract The article deals with cyber incidents that were recorded in the area of the V4 countries. It is important for the discussed topic to extract certain factors and with their help to characterise the conducted cyberattacks in terms of political motivations. The analysis tries to prove the existence of politically motivated cyberattacks. This, in turn, helps to determine the consequences of such cyber incidents. Moreover, the scale and magnitude of the cyberattack can be information to determine the strategic maturity and cyber capabilities of the adversary. Thus, the incidents that have occurred allow a cyberattack to be characterised in political terms and thus have value as information about ongoing conflicts in cyberspace that either reflect reality or foreshadow actions yet to come in the real world. Cyber operations can also be used as a tool to build a sphere of influence and exert political, economic and military pressure on a particular state.
7

Połeć, Jolanta, i Wojciech Trzaskowski. "The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe". Przegląd Nauk o Obronności, nr 12 (20.06.2022): 111–30. http://dx.doi.org/10.37055/pno/150838.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
ObjectivesThe purpose of this article is to investigate and present the issue of cyberwar and its impact on the socio-economic activity of inhabitants of Central and Eastern Europe.MethodsThe main method used in this study is a systematic review of international and Polish political literature in the fields of cybersecurity, sociology, military, international relations and international politics.ResultsThe analysis enabled identifying the importance of the cyberspace driven by the technological development. Article discusses key terms, the concept of cyberwar, categorization of cyberattacks and their influence on the socio-economic activity of the inhabitants of Central and Eastern Europe. The last part examines examples of cyberattacks in Kosovo, Estonia, Georgia, Bulgaria and Ukraine.ConclusionsThe technological progress impacts the emergence of cyberthreats such as cybercrime, cyberterrorism or cyberwars carried out through the newest technology. These actions are affecting both state institutions and citizens. The examples prove that cyberwar is already being used to damage the big-scale national projects. A cyberattack often targets a politically inconvenient opponent, not to physically eliminate them but to cause chaos and a breach of trust among their adherents. Some countries use cyberattacks to influence the internal affairs of another country. Even if thoroughly planned and carried out, an attack can still change or strengthen the current government. Neglecting the threat of cyberattacks may affect the citizens gravely. It may increase the awareness of the danger or give an institution greater control over personal freedom of citizens. Cybersecurity is best achieved through education and raising awareness.
8

Hrushko, M. V. "ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE". Constitutional State, nr 43 (26.10.2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Growing impunity in cyberspace is cause by the lack of responsibility for the most serious cyberoperations that present a threat to both state and non-state actors. The only possible solution is to trace such cyberoperations to those who stand behind them. Since the seriousness of consequences increases in case of state-committed cyberattacks, the article deals with the issue of attribution of cyberattacks to states with the aim of ensuring responsible behavior of all states in cyberspace. The existing practice of public attribution and features of cyberoperations, as a rule, requires not only performing legal attribution, but also technical and public (political) attribution. Author thus starts with analyzing the current state of affairs – public attribution of cyberattack, its effectiveness and the role of private sector in attribution (decentralized attribution to support or deny government`s finding). The article also examines the customary basis for attributing state-related cyberattacks contained in the Articles on State Responsibility for Internationally Wrongful Acts and Tallinn Manual 2.0 on the Application of International Law to Cyberoperations. Although public attribution is, indeed, a step towards responsible behavior in cyberspace, legal attribution may contribute even more. In this article increased attention is paid to the test of effective control, which is used to attribute internationally wrongful acts to states committed by non-state actors acting under its control or direction. Finally, it concludes that global efforts are needed to ensure responsible behavior in cyberspace, especially in the context of international security. For this, states should get into partnership with private sector in performing attribution of cyberoperations and apply to international bodies, which have jurisdiction over state claims and are able to perform legal attribution for the purpose of establishing state responsibility. Only in this way it will be possible to guarantee responsible behavior of states in cyberspace, and create a common understanding and approach against cyberoperations committed by non-state cyber actors.
9

Alsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani i Raed Alsini. "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry 14, nr 7 (15.07.2022): 1450. http://dx.doi.org/10.3390/sym14071450.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Technological advancement has transformed traditional vehicles into autonomous vehicles. Autonomous vehicles play an important role since they are considered an essential component of smart cities. The autonomous vehicle is an intelligent vehicle capable of maintaining safe driving by avoiding crashes caused by drivers. Unlike traditional vehicles, which are fully controlled and operated by humans, autonomous vehicles collect information about the outside environment using sensors to ensure safe navigation. Autonomous vehicles reduce environmental impact because they usually use electricity to operate instead of fossil fuel, thus decreasing the greenhouse gasses. However, autonomous vehicles could be threatened by cyberattacks, posing risks to human life. For example, researchers reported that Wi-Fi technology could be vulnerable to cyberattacks through Tesla and BMW autonomous vehicles. Therefore, further research is needed to detect cyberattacks targeting the control components of autonomous vehicles to mitigate their negative consequences. This research will contribute to the security of autonomous vehicles by detecting cyberattacks in the early stages. First, we inject False Data Injection (FDI) attacks into an autonomous vehicle simulation-based system developed by MathWorks. Inc. Second, we collect the dataset generated from the simulation model after integrating the cyberattack. Third, we implement an intelligent symmetrical anomaly detection method to identify false data cyber-attacks targeting the control system of autonomous vehicles through a compromised sensor. We utilize long short-term memory (LSTM) deep networks to detect False Data Injection (FDI) attacks in the early stage to ensure the stability of the operation of autonomous vehicles. Our method classifies the collected dataset into two classifications: normal and anomaly data. The experimental result shows that our proposed model’s accuracy is 99.95%. To this end, the proposed model outperforms other state-of-the-art models in the same study area.
10

Eichensehr, Kristen E. "Decentralized Cyberattack Attribution". AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in attributions in recent years shows that attribution is far from impossible. After several years of only sporadic attributions, Western governments in 2017 began attributing cyberattacks to other governments more frequently and in a more coordinated fashion. But nongovernment actors have more consistently attributed harmful cyber activity to state actors. Although not without risks, these nongovernmental attributions play an important role in the cybersecurity ecosystem. They are often faster and more detailed than governmental attributions, and they fill gaps where governments choose not to attribute. Companies and think tanks have recently proposed centralizing attribution of state-sponsored cyberattacks in a new international entity. Such an institution would require significant start-up time and resources to establish efficacy and credibility. In the meantime, the current system of public-private attributions, decentralized and messy though it is, has some underappreciated virtues—ones that counsel in favor of preserving some multiplicity of attributors even alongside any future attribution entity.

Rozprawy doktorskie na temat "State cyberattacks":

1

Morrison, Glenn Sean. "Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging". Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1535490827978036.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe". Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Les systèmes informatiques sont des éléments essentiels de l'interaction politique, sociale et économique et sont devenus fondamentaux pour le développement et l'innovation. Ces systèmes sont pourtant autant de ressources qu'ils peuvent être vecteurs de menaces pour la sécurité, les droits et les libertés des utilisateurs. En effet, les atteintes aux systèmes de traitement automatisé de données se matérialisent par des procédés infractionnels divers, réalisés par des catégories d'auteurs variées et touchant de nombreuses victimes différentes telles que les particuliers, les entreprises, ou encore les États. L'étude de la répression de ces attaques informatiques conduit à s'interroger sur la pertinence de la règlementation française les concernant au travers d'un double examen.Le premier consiste, d'une part à rapprocher, par une analyse horizontale, le droit pénal spécial de fond et de forme créé en la matière, sous l'angle du droit comparé (Belgique et Italie), et examiner, d'autre part, par une analyse verticale, leurs cohérences face aux standards européens. Dans cette perspective l'étude révèle l'existence d'un corpus législatif dense, mais également abscond en raison de sa technicité. Elle fait aussi état en matière procédurale d'une frontière fragile entre le développement de techniques efficaces mais également susceptibles de porter atteinte aux libertés individuelles. Le second examen s'attache, pour sa part, à la politique globale mise en oeuvre par les États pour prévenir et lutter contre ces atteintes informatiques. Sur ce point, la coopération entre les États est un corollaire de l'efficacité de la répression en ce domaine. Cependant, les choix réalisés pour favoriser une telle collaboration rencontrent en pratique des difficultés d'application importantes. À ces difficultés s'ajoutent celles liées à la commission d'attaques informatiques par les États eux-mêmes, puisque le cyberespace apparaît dorénavant comme un nouveau champ de conflits politiques et militaires. En ce sens, alors qu'il semblait que ces cyberattaques étatiques se réalisaient dans une zone de non-droit, il s'avère au contraire, que le droit pénal dispose d'une certaine potentialité à les réprimer
Computer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression

Książki na temat "State cyberattacks":

1

1940-, Owens William A., Dam Kenneth W, Lin Herbert, National Research Council (U.S.). Committee on Offensive Information Warfare., National Research Council (U.S.). Computer Science and Telecommunications Board. i National Research Council (U.S.). Division on Engineering and Physical Sciences., red. Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Washington, DC: National Academies Press, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bittner, Marc-Philipp, Anabel Guntermann, Christoph Benedikt Müller i Darius Rostam, red. Cybersecurity als Unternehmensleitungsaufgabe. Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748927679.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Cybersecurity is a central challenge for many companies. On the one hand, companies have to protect themselves against cyberattacks; on the other hand, they have special obligations towards third parties and the state in critical infrastructures or when dealing with personal data. These responsibilities converge with company management. This volume examines the duties and liability risks of management in connection with cyber security from the perspective of corporate, constitutional and labour law. The volume is based on a conference of the same name, which took place in cooperation with the Friedrich Naumann Stiftung für die Freiheit on 23 and 24 October 2020 at Bucerius Law School in Hamburg. With contributions by Andreas Beyer, Marc Bittner, Alexander Brüggemeier, Anabel Guntermann, Katrin Haußmann, Dennis-Kenji Kipker, Christoph Benedikt Müller, Isabella Risini, Darius Rostam, Sarah Schmidt-Versteyl and Gerald Spindler.
3

Freilich, Charles D. The Changing Military Threat. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Chapter 3 argues that the military threat Israel faces has changed dramatically. Attacks by Arab armies are now the least likely, and the overall threat has diminished. Israel’s conventional superiority led its adversaries to adopt a decades-long strategy of attrition designed to lead to Israel’s collapse. Iran is the most sophisticated adversary Israel has ever faced, its ongoing nuclear program the greatest threat. Hezbollah’s rockets are the primary immediate threat. Iran, Hezbollah, and Syria now constitute one joint front. They and Hamas believe that the home front is Israel’s Achilles heel, which allows them to offset its military superiority, and it has become the primary battlefield, leading to wars of mutual deterrence and destruction. Hamas’s Gaza is the embodiment of Israel’s fears of a Palestinian state. Terrorism is a strategic threat, swaying elections and negotiations. A large regional conventional buildup is underway. Cyberattacks now pose one of the greatest threats.
4

Koppel, Ted. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Random House Audio, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Koppel, Ted. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Broadway Books, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "State cyberattacks":

1

Shahin, Mohammad, FFrank Chen, Hamed Bouzary, Ali Hosseinzadeh i Rasoul Rashidifar. "Implementation of a Novel Fully Convolutional Network Approach to Detect and Classify Cyber-Attacks on IoT Devices in Smart Manufacturing Systems". W Lecture Notes in Mechanical Engineering, 107–14. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18326-3_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
AbstractIn recent years, Internet of things (IoT) devices have been widely implemented and industrially improved in manufacturing settings to monitor, collect, analyze, and deliver data. Nevertheless, this evolution has increased the risk of cyberattacks, significantly. Consequently, developing effective intrusion detection systems based on deep learning algorithms has proven to become a dependable intelligence tool to protect Industrial IoT devices against cyber-attacks. In the current study, for the first time, two different classifications and detection long short-term memory (LSTM) architectures were fine-tuned and implemented to investigate cyber-security enhancement on a benchmark Industrial IoT dataset (BoT-IoT) which takes advantage of several deep learning algorithms. Furthermore, the combinations of LSTM with FCN and CNN demonstrated how these two models can be used to accurately detect cyber security threats. A detailed analysis of the performance of the proposed models is provided. Augmenting the LSTM with FCN achieves state-of-the-art performance in detecting cybersecurity threats.
2

Fritsch, Lothar, Aws Jaber i Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware". W Communications in Computer and Information Science, 41–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the face of defensive deployment of anti-malware AI techniques. This article summarizes the state of the art in AI-enhanced malware and the evasion and attack techniques it uses against AI-supported defensive systems. Our findings include articles describing targeted attacks against AI detection functions, advanced payload obfuscation techniques, evasion of networked communication with AI methods, malware for unsupervised-learning-based cyber-physical sabotage, decentralized botnet control using swarm intelligence and the concealment of malware payloads within neural networks that fulfill other purposes.
3

Miadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting". W Global Studies, 261–86. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
According to the 2016 EU Global Strategy (EUGS), today's world is characterized by an increased strategic competition and rising threats to multilateralism and a rules-based order. In this fast-evolving environment, the EU has shifted from its traditional “values-based” approach in foreign policy to a “principled pragmatism”. This holds that the EU should solidify relations with countries with shared values, while also engaging strategically with rivals. The EU's goal is to protect its strategic interests in the world marked by the US-China rivalry, a confrontational relationship with the Trump administration, and Russia's growing ambitions in their shared neighborhood. The present chapter examines some aspects of the EU's efforts to secure its autonomy in an emergent terrain for international competition: cyberspace. The analysis will begin with an explanation of the broader context for the EU's approach to cybersecurity, which should be understood as part of the Union's longstanding pursuit of “strategic autonomy” in an increasingly competitive geopolitical environment. It then offers a description of deterrence theory and its application to cyberspace, before turning to the development of the EU Cyber Diplomacy toolbox and targeted restrictive measures in response to cyberattacks. It will then seek to assess the deterrence potential of restrictive measures on the basis of some generic attributes of the concept of deterrence identified in rich theoretic contributions on deterrence theory and cyberspace. It concludes that while sanctions might appear to be ineffective and non-aligned with the operational characteristics of the cyber domain, their potential for establishing good practices should not be discarded. They should instead be used as a vehicle for promoting and informing the international discourse on the norms of responsible state behavior in cyberspace.
4

Chacko, Ashwathy Anda, Bijolin Edwin i M. Roshni Thanka. "Detecting the Lateral Movement in Cyberattack at the Early Stage Using Machine Learning Techniques". W Lecture Notes in Electrical Engineering, 581–88. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2177-3_54.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sicard, Franck, Éric Zamai i Jean-Marie Flaus. "Critical States Distance Filter Based Approach for Detection and Blockage of Cyberattacks in Industrial Control Systems". W Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems, 117–45. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Van De Velde, Jacqueline. "The Dangers of Forceful Countermeasures as a Response to Cyber Election Interference". W Defending Democracies, 215–38. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197556979.003.0011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Cyberattacks are increasing in frequency, publicity, and impact, making significant cyber episodes a hallmark of modern foreign policy. One subset of these cyberattacks is state-supported interference in elections. For this form of election interference, existing international law offers states limited response options. This predicament has led some state officials and international legal experts to champion creative interpretations of international law that would allow forceful retributions—or “forceful countermeasures”—on cyber election interferers to dissuade states from conducting online election interference. This chapter explores both the existing international legal framework that apples to cyber interference in elections and the proposals to accept the possibility of forceful countermeasures. It concludes that although countermeasures are available above the use-of-force threshold, states should resist engaging in forceful countermeasures when addressing cyber election interference. States can employ other mechanisms, including drafting a new treaty regulating interference in the digital age, rather than stretching countermeasures doctrine beyond a prudent scope.
7

Boyte, Kenneth J. "A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine". W National Security, 108–25. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7912-0.ch007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.
8

Boyte, Kenneth J. "A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine". W Cyber Warfare and Terrorism, 1214–31. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch071.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.
9

Forst, Brian. "Managing Fear in a Post-Factual Era". W NATO Science for Peace and Security Series – E: Human and Societal Dynamics. IOS Press, 2021. http://dx.doi.org/10.3233/nhsdp200086.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Fear is dangerous because of its tendency to cause our instincts to overrule our ability to think; get us to behave against our self-interests; make us more easily exploited by politicians, terrorists, and others with harmful intentions; create enemies; and feed on itself in a vicious downward spiral. The problem is worsened by irresponsible media, politicians who exploit fear by distorting facts about threats to security, social networks that spread hatred and misinformation on the Internet, and cyberattacks. This paper describes these forces and argues that the vicious cycle of fear and the exploitation of fear can be broken by electing responsible leaders, using fear management programs at the national and state levels, applying lessons learned from community policing programs to reduce fear at the local level, and by instituting stronger sanctions against Internet abuse, including defenses against cyberattacks.
10

Maness, Ryan C., Rebecca Lorentz i Brandon Valeriano. "16. Cyber Conflict in the Age of Great Power Competition". W Strategy in the Contemporary World, 277–96. Oxford University Press, 2022. http://dx.doi.org/10.1093/hepl/9780192845719.003.0016.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
This chapter explains the concepts of cyberspace, cyberpower, cyber strategy, cyber security, and cyberwar and illustrates how cyberpower manifests today among both state and non-state actors. Managing information is part of a persistent challenge that is not unique to any time or place. What is different today is the speed of transmission and the reach of information, which are both aided by cyberattacks and cyber-enabled technologies that leverage digital communications. Search engines, video platforms, and encrypted messaging services allow for loaded phrases to return troves of fake stories and narratives reflecting extremist ideologies in the infosphere. The Covid-19 pandemic also brought along what can be dubbed an ‘infodemic’, where disinformation about mitigation and vaccines has yet to bring the crisis to a definitive end. These developments carry transformative national security implications for all societies. Cyber conflict—the use of digital technologies in military interactions or military affairs in the realm of international affairs—is also occurring. Cyber conflict involves direct cyberattacks that are aimed at opponents’ digitally enabled systems.

Streszczenia konferencji na temat "State cyberattacks":

1

Khan, Shiraz, Inseok Hwang i James Goppert. "Robust State Estimation in the Presence of Stealthy Cyberattacks". W 2022 American Control Conference (ACC). IEEE, 2022. http://dx.doi.org/10.23919/acc53348.2022.9867774.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Saraswat, Govind, Rui Yang, Yajing Liu i Yingchen Zhang. "Analyzing the effects of cyberattacks on distribution system state estimation". W 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2021. http://dx.doi.org/10.1109/isgt49243.2021.9372262.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kotsiuba, Igor. "Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI". W Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks. Promote Ukraine, 2019. http://dx.doi.org/10.34054/bdc004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sun, Yizhou, i Ya Zhang. "Adaptive tracking control of unknown state target for CPSs subjected to cyberattacks". W 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2022. http://dx.doi.org/10.1109/icarcv57592.2022.10004235.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Muzyka, Viktoriia. "ATTRIBUTION OF CYBERATTACKS COMMITTED THROUGH CYBERINFRASTRUCTURE OF A THIRD STATE AND DUE DILIGENCE OBLIGATION". W Relevant Trends of Scientific Research in the Countries of Central and Eastern Europe. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-002-5-32.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Patterson, Wayne, i Jeremy Blacksttone. "A Metric to Assist in Detecting International Phishing or Ransomware Cyberattacks". W 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002195.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Over the past decade, the number of cyberattacks such as ransomware, phishing, and other forms of malware have increased significantly, as has the danger to innocent users. The ability to launch such devastating attacks is no longer limited to well-funded, highly structured organizations including government agencies whose missions may well include cyberattacks.The focus of our study is threats to an individual not from such highly organized institutions, but rather less organized cybercriminal organizations with limited resources.The Internet provides ample opportunities for such criminal organizations to launch cyberattacks at minimal cost. One tool for such lower-level criminal organizations is Google Translate (GT) needed to launch a cyberattack on a user in a relatively advantaged country such as the United States, United Kingdom, or Canada. It has been observed that many such attacks may originate in a lesser developed country (LDC), where the local language is a language not common persons in target countries, for example English.It is a reasonable assumption that informal cyberattackers may not have a command of English and to use English for an attack online they may require a mechanism, such as the no-cost GT.In previous work, a number of authors have attempted to develop an index to measure the efficiency or what might be called an ABA translation. This involves beginning with a test document in language A, then GT to translate into language B, then back again to A. The resulting original text is then compared to the transformation by using a modified Levenshtein distance computation for the A versions.The paper analyzes the process of determining an index to detect if a text has been translated from an original language and location, assuming the attack document has been written in one language and translated using GT into the language of the person attacked. The steps involved in this analysis include:a) Consistency: in order to determine consistency in the use of the ABA/GT process, the primary selection of test is compared with random samples from the test media;b) Expanded selection of languages for translation: prior work has established use of the technique for 12 language pairs. The current work extends analysis to a wider set of languages, including those reported as having the highest levels of cyberattacks.c) Back translation of selected languages: used to extend the quality of those translations are made.d) New language pairs are considered: by analyzing the countries and indigenous languages of the countries paired with the highest levels of cyberattack and the highest levels of cyberdefense, additional language pairs are added to this analysis;e) Comparison to prior results: results found in this paper are used for a proposed network for all language pairs considered in this analysis.The end product is a metric giving a probability of determining the original source language of the cyberattack as compared to the translation to the victim's language, with the expectation that this will allow for an increased likelihood of being able to identify the attackers.
7

Parfenov, Denis, Lubov Zabrodina, Arthur Zhigalov, Vadim Torchin i Anton Parfenov. "Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes". W 2019 International Conference on Engineering and Telecommunication (EnT). IEEE, 2019. http://dx.doi.org/10.1109/ent47717.2019.9030558.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Burguin, Yvan, David Espes, Philippe Rauffet, Christine Chauvin i Philippe Le Parc. "Cyberdefense Adaptive Training Based on the Classification of Operator Cognitive State". W 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002202.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
To face the increasing number and the variety of cyberattacks, training and adaptation of cyberdefense operators become critical and should be managed all along their careers. Thus, it is necessary to develop adaptive training methods that are able to quickly detect operators' weaknesses and to propose a strategy to reinforce their skills on these points. This paper presents the choice of a cognitive model in order to guide the development of an adaptive training software. In this regard, the paper proposes a review of several elements that contributed to the development of the model.Cyberattacks are continuously increasing in variety and number, and therefore require a constant adaptation from the operator who must react to each attack with rapidity and efficiency. To face these changes, cyber operators must be trained regularly.This training aims to: 1) maintain knowledge of cyber operators up to date, 2) train cyber operators to use new tools and 3) allow cyber operators to appropriately react to new attacks.In this regard, adaptive training softwares support the training of cyberdefense operators in order to improve their performance in real conditions. To propose an adaptive training software, there are several requirements to satisfy such as an ecological environment, a system to adapt the training scenario autonomously and a way to assess the difficulties experienced by the trainee. To support this dynamic and customised adaptation of the training scenario, it is important to detect or predict when errors may occur. For this purpose, behavioural and physiological data can be used to assess the variations in performance and mental workload that can lead to an error. This paper deals with the choice of a cognitive model that could support the design of a software for adaptive training in the cyberdefense field. Such a model would allow us to understand the different cognitive processes used by the operator to perform tasks, and to identify the factors that could contribute to performance decrement. This model can then orient the selection of appropriate physiological and behavioural indicators to measure what parts of the task cause difficulty to the operator.
9

Qian, Yiyue, Yiming Zhang, Yanfang Ye i Chuxu Zhang. "Adapting Meta Knowledge with Heterogeneous Information Network for COVID-19 Themed Malicious Repository Detection". W Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/507.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
As cyberattacks caused by malware have proliferated during the pandemic, building an automatic system to detect COVID-19 themed malware in social coding platforms is in urgent need. The existing methods mainly rely on file content analysis while ignoring structured information among entities in social coding platforms. Additionally, they usually require sufficient data for model training, impairing their performances over cases with limited data which is common in reality. To address these challenges, we develop Meta-AHIN, a novel model for COVID-19 themed malicious repository detection in GitHub. In Meta-AHIN, we first construct an attributed heterogeneous information network (AHIN) to model the code content and social coding properties in GitHub; and then we exploit attention-based graph convolutional neural network (AGCN) to learn repository embeddings and present a meta-learning framework for model optimization. To utilize unlabeled information in AHIN and to consider task influence of different types of repositories, we further incorporate node attribute-based self-supervised module and task-aware attention weight into AGCN and meta-learning respectively. Extensive experiments on the collected data from GitHub demonstrate that Meta-AHIN outperforms state-of-the-art methods.
10

Udroiu, Adriana meda. "THE CYBERSECURITY OF ELEARNING PLATFORMS". W eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-229.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
In the last years, cybersecurity becomes a strategic concept which is included all types of security strategies. Globalization and the Internet have given new incredible powers based on continuous development of network technologies for individuals, organizations and nations. For anyone - students, soldiers, spies, propagandists, hackers and terrorists - gathering information, communications, fundraising and public relations have been digitized and revolutionized. E/Online learning platforms represent a modern form of educations which used digital strategies to present the data. In this context, online platforms used digital information and web based platform which must be secured against cyberattacks. In the national critical infrastructure protection framework, the education field represent one of the important critical element (infrastructure). The education infrastructure includes education institutions, people – students, teachers and administrative personal and – most important – the digital infrastructure that supports all data handled. Elearning platforms are part of this digital infrastructure. The increase dependence of elearning platforms on web infrastructure lets cyber-attacks become lethal to digital learning infrastructure; and many attacks are from both state and non-state actors. Because digital learning platforms are low secured, the actors used them as gateways for their attacks on other more important networks such as governmental networks. In the international context, the cyber security issue, as a component of national security, becomes the theme and rationale for developing specific instruments of fundamental and highly applied research. This paper presents the most important aspects of cybersecurity of elearning platforms.

Raporty organizacyjne na temat "State cyberattacks":

1

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), luty 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review focuses on malicious threats to civilian aviation. It, therefore, excludes weather events or accidents. The first section lists major malicious threats to civilian aviation since 1975. It includes both actual and planned events (e.g. hijackings that were prevented) that are recorded in open-source documents. Each threat is listed alongside information on its cause (e.g. terrorism, state actions, crime), the context in which it occurred (broader factors shaping the risk including geography, regime type, technology), and its impact (on passengers, policy, security, economic). The second section discusses some of the trends in threats to aviation. Motives for malicious threats include terrorism, crime, asylum-seeking, and insider attacks by aggrieved or mentally ill airline staff. Hijacking has been the most common form of threat, although bombing or suicide attacks have killed more people. Threats may also take the form of accidental attacks on civilian planes misidentified as threats in conflict zones. Experts suggest that growing threats are cyberattacks and the use of unmanned aerial vehicles, although neither has yet caused a major incident.
2

Anthony, Ian, Fei Su i Lora Saalman. Naval Incident Management in Europe, East Asia and South East Asia. Stockholm International Peace Research Institute, marzec 2023. http://dx.doi.org/10.55163/zzbg6990.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Unprecedented global turbulence in 2022 has demonstrated the need to pay increased attention to naval operations. Enhanced military capability allows naval power projection far beyond home waters. New threats and challenges are emerging from technological advances and new applications, not least the vulnerability of warships and naval facilities to cyber intrusions and cyberattacks. As states implement the programmes they need to protect and promote their interests at sea, there is also likely to be an increase in the number of close tracking incidents. How effective current risk reduction mechanisms will be at dealing with incidents at sea is unclear. This Insights Paper provides a preliminary assessment of the existing mechanisms and suggests areas for further improvement.

Do bibliografii