Literatura científica selecionada sobre o tema "Cyber defensive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cyber defensive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Cyber defensive"
Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.
Texto completo da fonteDuvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Texto completo da fonteLachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.
Texto completo da fonteAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Texto completo da fonteSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Texto completo da fonteZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.
Texto completo da fonteVenkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.
Texto completo da fonteZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Texto completo da fonteAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Texto completo da fonteJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Texto completo da fonteTeses / dissertações sobre o assunto "Cyber defensive"
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Texto completo da fonteWong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.
Texto completo da fonteStensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.
Texto completo da fonteCloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.
Texto completo da fonteOdhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Texto completo da fonteSushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.
Texto completo da fonteMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Texto completo da fonteZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Texto completo da fonteAzab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Texto completo da fonteNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Texto completo da fonteLivros sobre o assunto "Cyber defensive"
Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.
Texto completo da fonteCarayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.
Texto completo da fonteKott, Alexander, Cliff Wang, and Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.
Texto completo da fonteBaddi, Youssef, Mohammed Amin Almaiah, Omar Almomani, and Yassine Maleh. The Art of Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781032714806.
Texto completo da fonteKott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.
Texto completo da fonteEdwards, Dr Jason. Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6.
Texto completo da fonteJajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.
Texto completo da fonteVijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.
Texto completo da fonteKshetri, Naresh, Purnendu Shekhar Pandey, and Mohiuddin Ahmed. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures. CRC Press, 2024. https://doi.org/10.1201/9781003449515.
Texto completo da fonteRani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.
Texto completo da fonteCapítulos de livros sobre o assunto "Cyber defensive"
Kassab, Hanna Samir. "Cyber-Vulnerability." In Prioritization Theory and Defensive Foreign Policy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-48018-3_7.
Texto completo da fonteKatagiri, Nori. "Why Defensive Measures Are Too Defensive: Strategy of Denial." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_3.
Texto completo da fonteHuang, Linan, and Quanyan Zhu. "Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception." In Autonomous Cyber Deception. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_5.
Texto completo da fonteTurtiainen, Hannu, Andrei Costin, and Timo Hämäläinen. "Defensive Machine Learning Methods and the Cyber Defence Chain." In Artificial Intelligence and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_7.
Texto completo da fonteOsula, Anna-Maria. "Building Cyber Resilience: The Defensive Shield for the EU." In New Security Challenges. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08384-6_9.
Texto completo da fonteZhao, Jiamiao, Fei Hu, and Xiali Hei. "Defensive Schemes for Cyber Security of Deep Reinforcement Learning." In AI, Machine Learning and Deep Learning. CRC Press, 2023. http://dx.doi.org/10.1201/9781003187158-12.
Texto completo da fonteManasa, Koppula, and L. M. I. Leo Joseph. "IoT Security Vulnerabilities and Defensive Measures in Industry 4.0." In Artificial Intelligence and Cyber Security in Industry 4.0. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2115-7_4.
Texto completo da fonteFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Texto completo da fonteHodges, Duncan, and Oliver Buckley. "Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_34.
Texto completo da fonteCabada, Pavol. "Cyber-Democracy and Cyber-Defense." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_11-1.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Cyber defensive"
Zhao, Zhenqi, Jun Teng, Wenduo Yu, Fan Yang, Linjiang Deng, and Bangpeng He. "Offensive and Defensive Strategy for Distribution Network CPS Considering EV Source-charge Bidirectional." In 2024 Second International Conference on Cyber-Energy Systems and Intelligent Energy (ICCSIE). IEEE, 2024. http://dx.doi.org/10.1109/iccsie61360.2024.10698065.
Texto completo da fonteCao, Jintao, Allie Null, Marissa Stewart, Suman Bhunia, and Mohammad Salman. "Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity." In 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics. IEEE, 2024. http://dx.doi.org/10.1109/ithings-greencom-cpscom-smartdata-cybermatics62450.2024.00065.
Texto completo da fontePavelka, Martin, and Ladislav Hudec. "Countermeasures Management in Cyber Defense Exercises." In 2024 New Trends in Signal Processing (NTSP). IEEE, 2024. http://dx.doi.org/10.23919/ntsp61680.2024.10726308.
Texto completo da fonteVelazquez, Alexander, Johannes F. Loevenich, Tobias Hürten, et al. "Cyber Operations Gyms to Train Autonomous Cyber Defense Agents for NATO." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047884.
Texto completo da fonteLofy, Cheri, and Mark Vriesenga. "Demystifying Cyber Systems Engineering." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3864.
Texto completo da fonteMckneely, Jennifer, Tara Sell, Kathleen Straub, and Daniel Thomas. "Defensive Cyber Maneuvers to Disrupt Cyber Attackers." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2023. http://dx.doi.org/10.24251/hicss.2023.814.
Texto completo da fonteFerguson-Walter, Kimberly, Sunny Fugate, Justin Mauger, and Maxine Major. "Game theory for adaptive defensive cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314063.
Texto completo da fonteBierbrauer, David, Robert Schabinger, Caleb Carlin, Jonathan Mullin, John Pavlik, and Nathaniel D. Bastian. "Autonomous cyber warfare agents: dynamic reinforcement learning for defensive cyber operations." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, edited by Latasha Solomon and Peter J. Schwartz. SPIE, 2023. http://dx.doi.org/10.1117/12.2663093.
Texto completo da fonteParker, Thomas, Jeremy Jones, Joshua Mayberry, et al. "Defensive Cyber Operations in a Software-Defined Network." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.688.
Texto completo da fonteHu, Bing, Longqiang Zhang, Zhiwu Guo, et al. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.
Texto completo da fonteRelatórios de organizações sobre o assunto "Cyber defensive"
Su, Fei, Larisa Saveleva Dovgal, and Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/ttrc4774.
Texto completo da fonteCarey, III, and Casimir C. NATO's Options for Defensive Cyber Against Non-State Actors. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592754.
Texto completo da fonteBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.
Texto completo da fonteLohn, Andrew, Anna Knack, Ant Burke, and Krystal Jackson. Autonomous Cyber Defense. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/2022ca007.
Texto completo da fonteHoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca007.
Texto completo da fontePlantenga, Todd, and Tamara Gibson Kolda. Analytics for Cyber Network Defense. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1113857.
Texto completo da fonteSmith, Randall. Multi-Community Cyber Defense (MCCD). Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408408.
Texto completo da fonteGiles, Keir, and Kim Hartmann. Cyber Defense: An International View. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622264.
Texto completo da fonteLuckinbill, Ryan. Cyber Defense Competition Card Game. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-471.
Texto completo da fonteColbaugh, Richard, and Kristin L. Glass. Proactive defense for evolving cyber threats. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059470.
Texto completo da fonte