Results 111 to 120 of about 144,780 (287)
Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no ...
Cezar Vasilescu
doaj
Beyond Manoeuvre Theory for European Defence
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Detecting Cyber Attacks In-Vehicle Diagnostics Using an Intelligent Multistage Framework. [PDF]
Awaad TA +3 more
europepmc +1 more source
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar +3 more
wiley +1 more source
A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration in various fields because of their emergent applications. Though the robust dependence on communication networks creates cyber-physical systems susceptible to ...
Shivani Gaba +8 more
doaj +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents.
Maria Valentina Clavijo Mesa +2 more
doaj +1 more source
A Review on Cyber Security and Cyber Attacks
As technology has advanced, data protection has gotten more challenging. Information security now depends on cyber security. These days, protecting information is one of the biggest problems. Unquestionably, the Internet has created a new avenue for exploitation known as cybercrime because of the limitless amount of free websites.
Duaa Fadhel Najem, Suhad Muhajer Kareem
openaire +1 more source
Cyber Attacks: Proportionality and Precautions in Attack
Malicious cyber activities are becoming more and more commonplace, including between nations. This has caused great speculation as to the rules that govern military cyber operations, particularly during armed conflict. The upcoming publication of the Tallinn Manual on the International Law Applicable to Cyber Warfare is indicative of the importance of ...
openaire +2 more sources

