Artigos de revistas sobre o tema "State cyberattacks"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "State cyberattacks".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective". European Conference on Cyber Warfare and Security 21, n.º 1 (8 de junho de 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Texto completo da fonteNizovtsev, Yuriy Yu, Andrii M. Lyseiuk e Mykhailo Kelman. "From self-affirmation to national security threat". Revista Científica General José María Córdova 20, n.º 38 (1 de abril de 2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Texto completo da fonteAnnef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA". Sriwijaya Journal of International Relations 1, n.º 1 (28 de junho de 2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Texto completo da fonteKOLOSOK, Irina N., e Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods". Elektrichestvo 6, n.º 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Texto completo da fonteKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng e Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems". Transportation Research Record: Journal of the Transportation Research Board 2672, n.º 19 (22 de julho de 2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Texto completo da fonteGórka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries". Politics in Central Europe 18, n.º 3 (1 de setembro de 2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Texto completo da fontePołeć, Jolanta, e Wojciech Trzaskowski. "The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe". Przegląd Nauk o Obronności, n.º 12 (20 de junho de 2022): 111–30. http://dx.doi.org/10.37055/pno/150838.
Texto completo da fonteHrushko, M. V. "ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE". Constitutional State, n.º 43 (26 de outubro de 2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.
Texto completo da fonteAlsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani e Raed Alsini. "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry 14, n.º 7 (15 de julho de 2022): 1450. http://dx.doi.org/10.3390/sym14071450.
Texto completo da fonteEichensehr, Kristen E. "Decentralized Cyberattack Attribution". AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Texto completo da fonteKnebel, Sebastian, Mario D. Schultz e Peter Seele. "Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating". Journal of Information, Communication and Ethics in Society 20, n.º 1 (11 de outubro de 2021): 91–109. http://dx.doi.org/10.1108/jices-01-2021-0015.
Texto completo da fonteVasylenko, Serhii, Igor Samoilov e Serhii Burian. "Method of control of the state of protection of the automated process control system of the critical infrastructure facility". Collection "Information Technology and Security" 10, n.º 1 (30 de junho de 2022): 17–26. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261047.
Texto completo da fonteKolosok, Irina, e Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation". E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Texto completo da fonteSurilova, O. O. "PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES". Constitutional State, n.º 43 (26 de outubro de 2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.
Texto completo da fonteVoronko, I. "DIFFERENTIAL-GAME MODEL OF INFORMATION PROTECTION FOR COMPUTER SYSTEMS OF TRANSPORT INFRASTRUCTURE". Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, n.º 38 (24 de dezembro de 2021): 201–12. http://dx.doi.org/10.32703/2617-9040-2021-38-198-19.
Texto completo da fontePoptchev, Peter. "NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages". Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.
Texto completo da fonteKolosok, Irina, e Liudmila Gurina. "A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis". E3S Web of Conferences 216 (2020): 01029. http://dx.doi.org/10.1051/e3sconf/202021601029.
Texto completo da fonteLYSENKO, SERGII, DMYTRO SOKALSKYI e IIANA MYKHASKO. "METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART". Computer systems and information technologies, n.º 3 (14 de abril de 2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.
Texto completo da fonteLukicheva, I. A., e A. L. Kulikov. "The usage of power system multi-model forecasting aided state estimation for cyber attack detection". Power engineering: research, equipment, technology 23, n.º 5 (9 de janeiro de 2022): 13–23. http://dx.doi.org/10.30724/1998-9903-2021-23-5-13-23.
Texto completo da fonteKallberg, Jan, e Bhavani Thuraisingham. "State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks". IT Professional 15, n.º 3 (maio de 2013): 32–35. http://dx.doi.org/10.1109/mitp.2013.20.
Texto completo da fonteMaltseva, Irina, Yuliya Chernish e Roman Shtonda. "ANALYSIS OF SOME CYBER THREATS IN WAR". Cybersecurity: Education, Science, Technique 16, n.º 4 (2022): 37–44. http://dx.doi.org/10.28925/2663-4023.2022.16.3744.
Texto completo da fonteSigholm, Johan. "Non-State Actors in Cyberspace Operations". Journal of Military Studies 4, n.º 1 (1 de dezembro de 2013): 1–37. http://dx.doi.org/10.1515/jms-2016-0184.
Texto completo da fonteMokhor, Volodymyr, Oleksandr Korchenko, Serhii Honchar, Maxsim Komarov e Alla Onyskova. "Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects". E3S Web of Conferences 280 (2021): 09009. http://dx.doi.org/10.1051/e3sconf/202128009009.
Texto completo da fonteТарасевич, Ксения Александровна. "Cyberattack as a Risk Factor During Formation of Business Reputation of a Commercial Legal Entity". ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, n.º 2 (15 de junho de 2022): 87–92. http://dx.doi.org/10.26163/gief.2022.68.56.015.
Texto completo da fonteVega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, José-Luis Casteleiro-Roca, Esteban Jove, María del Carmen Meizoso-López, Benigno Antonio Rodríguez-Gómez et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids". Applied Sciences 10, n.º 7 (27 de março de 2020): 2276. http://dx.doi.org/10.3390/app10072276.
Texto completo da fonteActon, James M. "Cyber Warfare & Inadvertent Escalation". Daedalus 149, n.º 2 (abril de 2020): 133–49. http://dx.doi.org/10.1162/daed_a_01794.
Texto completo da fonteGonzález-Manzano, Lorena, José M. de Fuentes, Cristina Ramos, Ángel Sánchez e Florabel Quispe. "Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model". Security and Communication Networks 2022 (29 de junho de 2022): 1–11. http://dx.doi.org/10.1155/2022/5784674.
Texto completo da fonteSoleymannejad, Mohammad, Danial Sadrian Zadeh, Behzad Moshiri, Ebrahim Navid Sadjadi, Jesús García Herrero e Jose Manuel Molina López. "State Estimation Fusion for Linear Microgrids over an Unreliable Network". Energies 15, n.º 6 (21 de março de 2022): 2288. http://dx.doi.org/10.3390/en15062288.
Texto completo da fontePérez-Morón, James. "Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda". Journal of Asia Business Studies 16, n.º 2 (3 de novembro de 2021): 371–95. http://dx.doi.org/10.1108/jabs-11-2020-0444.
Texto completo da fonteNikolaienko, Bohdan, e Serhii Vasylenko. "APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES". Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, n.º 4 (20 de dezembro de 2021): 9–13. http://dx.doi.org/10.35784/iapgos.2822.
Texto completo da fonteLobach, Dmitriy. "TO THE QUESTION OF POSSIBLE INTERNATIONAL LEGAL QUALIFICATION OF CYBER ATTACKS AS A CRIME OF AGGRESSION AND INTERNATIONAL TERRORISM". Advances in Law Studies 9, n.º 4 (25 de dezembro de 2021): 46–50. http://dx.doi.org/10.29039/2409-5087-2021-9-4-46-50.
Texto completo da fonteToliupa, S., S. Buchyk, O. Buchyk e O. Kulinich. "PROTECTION OF STATE MANAGEMENT OF CRITICAL INFRASTRUCTURE OBJECTS UNDER THE INFLUENCE OF CYBER ATTACKS". Information and communication technologies, electronic engineering 2, n.º 2 (dezembro de 2022): 33–41. http://dx.doi.org/10.23939/ictee2022.02.033.
Texto completo da fonteAbuali, M. M., e M. Sh Junisbekov. "Current cybersecurity state of automated processes in the international Aktau seaport". Mechanics and Technologies, n.º 3 (30 de setembro de 2021): 58–62. http://dx.doi.org/10.55956/giwk9768.
Texto completo da fonteShin, Young, Jae Lee e Myungchul Kim. "Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles". Journal of the Association for Information Systems 19, n.º 3 (março de 2018): 152–81. http://dx.doi.org/10.17705/1jais.00488.
Texto completo da fonteBoyte, Kenneth J. "A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine: Exemplifying the Evolution of Internet-Supported Warfare". International Journal of Cyber Warfare and Terrorism 7, n.º 2 (abril de 2017): 54–69. http://dx.doi.org/10.4018/ijcwt.2017040104.
Texto completo da fonteLavrova, D. S. "Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks". Automatic Control and Computer Sciences 53, n.º 8 (dezembro de 2019): 1023–25. http://dx.doi.org/10.3103/s0146411619080133.
Texto completo da fonteShterev, Yordan. "Concepts of Cyber Security". Innovative STEM Education 4, n.º 1 (10 de junho de 2022): 79–88. http://dx.doi.org/10.55630/stem.2022.0411.
Texto completo da fonteDeng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang e Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities". Scientific Programming 2020 (27 de setembro de 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Texto completo da fonteEfrony, Dan, e Yuval Shany. "A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice". American Journal of International Law 112, n.º 4 (outubro de 2018): 583–657. http://dx.doi.org/10.1017/ajil.2018.86.
Texto completo da fonteZhou, Buxiang, Yating Cai, Tianlei Zang, Jiale Wu, Binjie Sun e Shi Chen. "Reliability Assessment of Cyber–Physical Distribution Systems Considering Cyber Disturbances". Applied Sciences 13, n.º 6 (8 de março de 2023): 3452. http://dx.doi.org/10.3390/app13063452.
Texto completo da fonteRiebe, Thea, Marc-André Kaufhold e Christian Reuter. "The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study". Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (13 de outubro de 2021): 1–30. http://dx.doi.org/10.1145/3479865.
Texto completo da fonteSutikno, Tole, e Deris Stiawan. "Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector?" Bulletin of Electrical Engineering and Informatics 11, n.º 6 (1 de dezembro de 2022): 2989–94. http://dx.doi.org/10.11591/eei.v11i6.4854.
Texto completo da fonteKalinin, Maxim, Dmitry Zegzhda, Vasiliy Krundyshev, Daria Lavrova, Dmitry Moskvin e Evgeny Pavlenko. "Application of Bioinformatics Algorithms for 3RO\PRUSKLF Cyberattacks Detection". Informatics and Automation 20, n.º 4 (3 de agosto de 2021): 820–44. http://dx.doi.org/10.15622/ia.20.4.3.
Texto completo da fonteHallman, Roger A., Maxine Major, Jose Romero-Mariona, Richard Phipps, Esperanza Romero, Scott M. Slayback, Francisco Tacliad e John M. San Miguel. "Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures". International Journal of Organizational and Collective Intelligence 11, n.º 2 (abril de 2021): 91–112. http://dx.doi.org/10.4018/ijoci.2021040105.
Texto completo da fonteTANRIVERDIYEV, Elshan. "THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES". National Security Studies 23, n.º 1 (30 de março de 2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.
Texto completo da fonteMarkov, A., e N. Romashkina. "The Problem of Identifying the Source (Atribution) of Cyberattacks – An International Security Factor". World Economy and International Relations 66, n.º 12 (2022): 58–68. http://dx.doi.org/10.20542/0131-2227-2022-66-12-58-68.
Texto completo da fonteHumeniuk, I. V., M. S. Basaraba e O. V. Nekrilov. "METHODS OF ENSURING CYBER SECURITY OF CRITICAL COMPONENTSNETWORKS OF INFORMATION AND TELECOMMUNICATION SYSTEM". Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, n.º 18 (30 de dezembro de 2020): 101–10. http://dx.doi.org/10.46972/2076-1546.2020.18.10.
Texto completo da fonteKyva, Vladyslav. "ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION". Cybersecurity: Education, Science, Technique 3, n.º 15 (2022): 53–70. http://dx.doi.org/10.28925/2663-4023.2022.15.5370.
Texto completo da fonteAhmed, Mohiuddin, David Cox, Benjamin Simpson e Aseel Aloufi. "ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things". Applied Sciences 12, n.º 4 (14 de fevereiro de 2022): 1990. http://dx.doi.org/10.3390/app12041990.
Texto completo da fonteDiorditsa, Igor. "Modern legal content of optimization of directions of administrative and legal regulation of the state cybersecurity policy". Slovo of the National School of Judges of Ukraine, n.º 4(33) (15 de março de 2021): 31–42. http://dx.doi.org/10.37566/2707-6849-2020-4(33)-3.
Texto completo da fonte