Results 91 to 100 of about 137,074 (286)
Cyberterrorism: suatu Tantangan Komunikasi Asimetris Bagi Ketahanan Nasional [PDF]
Cyberterrorism merupakan aktivitas dan/atau metode yang digunakan oleh sejumlah jaringan atau kelompok teroris. Tidak dapat dipungkiri bahwa dunia maya dan kemajuan teknologi mudah menjadi wadah bagi mereka dalam melakukan aksinya.
A.S, Aa Bambang, Fitriana, I. (Idealisa)
core
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Using the Oldest Military Force for the Newest National Defense
The National Guard is establishing Cyber Mission Teams (CMT) that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions.
Brian Claus +3 more
doaj +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
Проаналізовано заходи із забезпечення кібербезпеки провідних держав світу, виділені основні тенденції трансформації внутрішньої політики держав з огляду на активізацію кіберзагроз у світі. Запропоновано шляхи поліпшення кібербезпекової політики України з
Oleksandr M. Kosohov, Аnatoliy O. Siryk
doaj
Cyber Threats Identification in the Evolving Digital Reality [PDF]
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2016Modern web technologies have already become an indispensable part of our everyday life, shaping a new, overlaid tech ...
Minchev, Zlatogor
core
Maximizing the Economic, Environmental, and Social Impact of the Metaverse
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri +2 more
wiley +1 more source
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework
Automating cyber threat intelligence (CTI) collection and analysis in real time is critical for the timely detection and mitigation of cyber threats. Cybersecurity researchers have recently recommended CTI as a proactive and robust method for automated ...
Alemayehu Tilahun Haile +2 more
doaj +1 more source

