Literatura científica selecionada sobre o tema "Cyber defensive"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cyber defensive".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Cyber defensive"

1

Huntley, Wade, and Timothy Shives. "Strategic Impacts of the Cyber Offense/Defense Balance." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 214–21. https://doi.org/10.34190/eccws.24.1.3752.

Texto completo da fonte
Resumo:
This paper examines how the distribution of offensive and defensive cyber operations (OCO & DCO) contributes to the achievement of strategic goals. Drawing on established theories of the relationship of offensive and defensive weaponry in terrestrial conflict domains, the examination develops a methodological framework to assess the relative contributions of OCO and DCO to offensive and defensive cyber strategies and overall multi-domain outcomes. The paper identifies both challenges and opportunities in associating offensive and defensive cyber capabilities with appropriate offensive and
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Duvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.

Texto completo da fonte
Resumo:
While the centrality of cyber power in the safeguarding and advancing nation states’ national interests and objectives is now widely accepted, the academic discourse (on cyber power) is still incipient. In literature reviewed, cyber power is predominantly viewed as comprising of two dimensions, namely offensive and defensive. The exploratory analysis we conducted found that Africa’s unique, contextual factors necessitate an expanded conceptualisation of cyber power. This alternative conceptualisation does not dispute the existing notion that cyber power has offensive and defensive dimensions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Lachine, Brian, Scott Knight, and Joey Lord. "Cyber Defence Trainer for Marine Integrated Platform Management Systems." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 357–66. https://doi.org/10.34190/eccws.24.1.3333.

Texto completo da fonte
Resumo:
Modern civilian and military marine vessels employ integrated platform management systems to monitor and control various different operational ship systems such has engine control, navigation and potentially weapon systems. These platform management systems consist of information and operational technology (IT/OT) environments that integrate commercial operating systems, TCP/IP based protocols and supervisory control and data acquisition (SCADA) systems in order to monitor and control marine cyber physical systems. This integration of technologies introduces threat vectors as well as unique op
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Awan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Segell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.

Texto completo da fonte
Resumo:
The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional. An escalation in one could lead to an overall escalation in all. In the political areas and, by extension, in civil-military relations (CMR), the IDF has a defensive mode as routine, while an offensive mode is manifest rarely in emergencies and war. The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel’s adversaries do not share the same policies with regular cyber and terror attacks against
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

ZHEREBETS, O. "Review of the best practices of foreign experience and new legislation regarding the creation and functioning of cyber forces (on the example of Poland and the Czech Republic)." INFORMATION AND LAW, no. 4(51) (December 10, 2024): 162–71. https://doi.org/10.37750/2616-6798.2024.4(51).318013.

Texto completo da fonte
Resumo:
The general trends and features of the formation of cyber forces in countries such as Poland and the Czech Republic are determined. The measures devoted to the creation of cyber forces in the mentioned NATO countries have been analyzed. The competence, powers and functional tasks of the practical activities of the responsible cyber units were considered. The peculiarities of the use of cyber troops in the framework of conducting defensive and offensive cyber operations are summarized. Based on the generalization of the positive Polish and Czech experience of creating cyber forces, the prospect
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Venkata, Baladari. "Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks." European Journal of Advances in Engineering and Technology 8, no. 4 (2021): 82–87. https://doi.org/10.5281/zenodo.15044438.

Texto completo da fonte
Resumo:
Organizations are now facing more complex cyber threats, prompting them to implement forward-thinking security testing methods to protect their digital systems. The Red Team and Blue Team simulations offer a practical method for evaluating an organization's ability to withstand cyber threats by mimicking actual attacks and the corresponding defensive measures taken in response. These exercises aid in uncovering system weaknesses, boosting threat recognition, and refining incident response capacities. Integrating artificial intelligence-driven threat intelligence, automated security checks, and
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Zajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.

Texto completo da fonte
Resumo:
This paper examines Five Eyes surveillance programs as a threat to IT (Information Technology) security and IT security as resistance to these programs. I argue that the most significant of Snowden's disclosures have been the Five Eyes agencies’ systematic compromise of the technologies, networks, and standards in use within their own countries and abroad. Attacks on domestic infrastructure contradict the defensive posture of these agencies but are consistent with the project of cyber security as defined by the Five Eyes. The cyber security project of the Five Eyes nations is expansive in scop
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Alothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (2022): 1575. http://dx.doi.org/10.3390/electronics11101575.

Texto completo da fonte
Resumo:
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incident response. In this research work, we proposed a cyber incident model to handle real-time security attacks in various scenarios. The proposed model consisted of three teams: (1) the black team, (2) the red team, and (3) the blue team. The black team was a group of instructors responsible for setting up the environment. They had to educate the red and b
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Johnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.

Texto completo da fonte
Resumo:
Cyber attackers commonly operate in teams, which may process information collectively and thus, may be best understood when the team is treated as the unit of analysis. Future research in Oppositional Human Factors (OHF) should consider the impact of team-influencing and team-level biases and the impact that defensive interventions have on team cognition in general. Existing measurement approaches using team interactions may be well suited for studying red teams, and how OHF interventions impact cyber attackers.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Teses / dissertações sobre o assunto "Cyber defensive"

1

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Texto completo da fonte
Resumo:
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and comput
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.

Texto completo da fonte
Resumo:
With increased dependency on the Internet, cyber attacks are fast becoming an attractive option for state adversaries, in part because of the ease of hiding one's identity. In response, governments around the world are taking measures to improve their national cyber defenses. However, these defenses, which are generally passive in nature, have been insufficient to address the threat. This thesis explores the possibility of employing active cyber defenses to improve cyber defenses at the national level. Active cyber defense refers to the use of offensive actions, such as counter hacking, pr
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Stensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.

Texto completo da fonte
Resumo:
Approved for public release; distribution is unlimited.<br>This thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norways strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control. Norway must increasingly be perceived as a serio
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Cloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.

Texto completo da fonte
Resumo:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Moran, Daniel ; Denning, Dorothy. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 93-102). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.

Texto completo da fonte
Resumo:
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses of actions by convincing the aggressor that cost exceeds the profit. In cyberspace, where the costs are lower, deterrence is disputed because of the natural interconnectedness and constant actions. The aim of this study is to investigate how the US understands cyber deterrence. This study is motivated by the current ambiguity regarding whether deterrence works in cyberspace or not. Using both theories of conventional and cyber deterrence together with theories of offense and defense, the study fo
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Sushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.

Texto completo da fonte
Resumo:
Approved for public release; distribution is unlimited<br>The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber tec
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.

Texto completo da fonte
Resumo:
With recent advances in electronics and communication technologies, our daily lives are immersed in an environment of Internet-connected smart things. Despite the great convenience brought by the development of these technologies, privacy concerns and security issues are two topics that deserve more attention. On one hand, as smart things continue to grow in their abilities to sense the physical world and capabilities to send information out through the Internet, they have the potential to be used for surveillance of any individuals secretly. Nevertheless, people tend to adopt wearable devices
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.

Texto completo da fonte
Resumo:
Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usability.  Due to the proliferation of increasingly sophisticated cyber threats with exponentially destructiv
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Texto completo da fonte
Resumo:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Livros sobre o assunto "Cyber defensive"

1

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Kott, Alexander, Cliff Wang, and Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Baddi, Youssef, Mohammed Amin Almaiah, Omar Almomani, and Yassine Maleh. The Art of Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781032714806.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Edwards, Dr Jason. Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Vijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kshetri, Naresh, Purnendu Shekhar Pandey, and Mohiuddin Ahmed. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures. CRC Press, 2024. https://doi.org/10.1201/9781003449515.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Rani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Capítulos de livros sobre o assunto "Cyber defensive"

1

Kassab, Hanna Samir. "Cyber-Vulnerability." In Prioritization Theory and Defensive Foreign Policy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-48018-3_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Katagiri, Nori. "Why Defensive Measures Are Too Defensive: Strategy of Denial." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Huang, Linan, and Quanyan Zhu. "Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception." In Autonomous Cyber Deception. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Turtiainen, Hannu, Andrei Costin, and Timo Hämäläinen. "Defensive Machine Learning Methods and the Cyber Defence Chain." In Artificial Intelligence and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Osula, Anna-Maria. "Building Cyber Resilience: The Defensive Shield for the EU." In New Security Challenges. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08384-6_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Zhao, Jiamiao, Fei Hu, and Xiali Hei. "Defensive Schemes for Cyber Security of Deep Reinforcement Learning." In AI, Machine Learning and Deep Learning. CRC Press, 2023. http://dx.doi.org/10.1201/9781003187158-12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Manasa, Koppula, and L. M. I. Leo Joseph. "IoT Security Vulnerabilities and Defensive Measures in Industry 4.0." In Artificial Intelligence and Cyber Security in Industry 4.0. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2115-7_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Texto completo da fonte
Resumo:
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the f
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Hodges, Duncan, and Oliver Buckley. "Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_34.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Cabada, Pavol. "Cyber-Democracy and Cyber-Defense." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_11-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Cyber defensive"

1

Zhao, Zhenqi, Jun Teng, Wenduo Yu, Fan Yang, Linjiang Deng, and Bangpeng He. "Offensive and Defensive Strategy for Distribution Network CPS Considering EV Source-charge Bidirectional." In 2024 Second International Conference on Cyber-Energy Systems and Intelligent Energy (ICCSIE). IEEE, 2024. http://dx.doi.org/10.1109/iccsie61360.2024.10698065.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Cao, Jintao, Allie Null, Marissa Stewart, Suman Bhunia, and Mohammad Salman. "Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity." In 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics. IEEE, 2024. http://dx.doi.org/10.1109/ithings-greencom-cpscom-smartdata-cybermatics62450.2024.00065.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Pavelka, Martin, and Ladislav Hudec. "Countermeasures Management in Cyber Defense Exercises." In 2024 New Trends in Signal Processing (NTSP). IEEE, 2024. http://dx.doi.org/10.23919/ntsp61680.2024.10726308.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Velazquez, Alexander, Johannes F. Loevenich, Tobias Hürten, et al. "Cyber Operations Gyms to Train Autonomous Cyber Defense Agents for NATO." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047884.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Lofy, Cheri, and Mark Vriesenga. "Demystifying Cyber Systems Engineering." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3864.

Texto completo da fonte
Resumo:
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;As the United States’ (US) Department of Defense (DoD) works to maintain our battlefield superiority in the ground domain, we rapidly integrate new electronic capabilities into vehicles that communicate and cooperate over vehicle-to-infrastructure networks. These new capabilities contribute to increasing the potential attack surface, as described in the 2018 Government Accountability Office (GAO) report on Weapon System Cyber Security [&lt;xref rid="R1" ref-type="bibr"&gt;1&lt;/xref&gt;]. To understand the increasingly complex attack surface and to
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Mckneely, Jennifer, Tara Sell, Kathleen Straub, and Daniel Thomas. "Defensive Cyber Maneuvers to Disrupt Cyber Attackers." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2023. http://dx.doi.org/10.24251/hicss.2023.814.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ferguson-Walter, Kimberly, Sunny Fugate, Justin Mauger, and Maxine Major. "Game theory for adaptive defensive cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314063.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bierbrauer, David, Robert Schabinger, Caleb Carlin, Jonathan Mullin, John Pavlik, and Nathaniel D. Bastian. "Autonomous cyber warfare agents: dynamic reinforcement learning for defensive cyber operations." In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, edited by Latasha Solomon and Peter J. Schwartz. SPIE, 2023. http://dx.doi.org/10.1117/12.2663093.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Parker, Thomas, Jeremy Jones, Joshua Mayberry, et al. "Defensive Cyber Operations in a Software-Defined Network." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.688.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Hu, Bing, Longqiang Zhang, Zhiwu Guo, et al. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.

Texto completo da fonte
Resumo:
With the introduction of digital instrumentation system, the cyber security threat to nuclear power plants is becoming more and more serious. The existing cyber security standards of nuclear power plants still need to be improved, and the technology practice of defensive strategies is lacking all over the world. In this paper, based on the comparison of domestic and foreign regulations and standards, combined with the technical practice of I&amp;C system overall plan, a defense-in-depth model based on data flow is proposed. The overall technical requirements, hierarchy, network model, cyber se
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Cyber defensive"

1

Su, Fei, Larisa Saveleva Dovgal, and Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/ttrc4774.

Texto completo da fonte
Resumo:
While the European Union as a collective entity continues to abstain from endorsing an offensive cyber posture, several of its member states have adopted both defensive and offensive activities and capabilities in cyberspace. In doing so, these member states mirror trends in China, Russia and the United States, which seem to possess increasingly similar strategies for balancing defensive and offensive cyber operations. Given this context, EU policy will need to navigate the potential involvement of its member states in offensive operations, while continuing to advocate for a defence-centric st
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Carey, III, and Casimir C. NATO's Options for Defensive Cyber Against Non-State Actors. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592754.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Buchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.

Texto completo da fonte
Resumo:
Machine learning advances are transforming cyber strategy and operations. This necessitates studying national security issues at the intersection of AI and cybersecurity, including offensive and defensive cyber operations, the cybersecurity of AI systems, and the effect of new technologies on global stability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Lohn, Andrew, Anna Knack, Ant Burke, and Krystal Jackson. Autonomous Cyber Defense. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/2022ca007.

Texto completo da fonte
Resumo:
The current AI-for-cybersecurity paradigm focuses on detection using automated tools, but it has largely neglected holistic autonomous cyber defense systems — ones that can act without human tasking. That is poised to change as tools are proliferating for training reinforcement learning-based AI agents to provide broader autonomous cybersecurity capabilities. The resulting agents are still rudimentary and publications are few, but the current barriers are surmountable and effective agents would be a substantial boon to society.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Hoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca007.

Texto completo da fonte
Resumo:
As states turn to AI to gain an edge in cyber competition, it will change the cat-and-mouse game between cyber attackers and defenders. Embracing machine learning systems for cyber defense could drive more aggressive and destabilizing engagements between states. Wyatt Hoffman writes that cyber competition already has the ingredients needed for escalation to real-world violence, even if these ingredients have yet to come together in the right conditions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Plantenga, Todd, and Tamara Gibson Kolda. Analytics for Cyber Network Defense. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1113857.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Smith, Randall. Multi-Community Cyber Defense (MCCD). Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408408.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Giles, Keir, and Kim Hartmann. Cyber Defense: An International View. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622264.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Luckinbill, Ryan. Cyber Defense Competition Card Game. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-471.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Colbaugh, Richard, and Kristin L. Glass. Proactive defense for evolving cyber threats. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059470.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!