Results 121 to 130 of about 31,297 (287)
Beyond Manoeuvre Theory for European Defence
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley +1 more source
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source
Cyber attack evaluation dataset for deep packet inspection and analysis. [PDF]
Shandilya SK +3 more
europepmc +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa +4 more
doaj +1 more source
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar +3 more
wiley +1 more source
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. [PDF]
Le TD +6 more
europepmc +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms. [PDF]
Alsaade FW, Al-Adhaileh MH.
europepmc +1 more source
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source

