Results 31 to 40 of about 140,490 (288)

Cyber Warfare and National Security

open access: yesChina Quarterly of International Strategic Studies
This study aims to provide insights into cyber threats as a new form of conflict, their regulation under international law, and the potential measures that nations, particularly China, can adopt to mitigate their harmful consequences.
Khoirunnisa Khoirunnisa   +4 more
doaj   +1 more source

Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models ...
Heorhii Zemlianko, Vyacheslav Kharchenko
doaj   +1 more source

Automated Cyber and Privacy Risk Management Toolkit

open access: yesSensors, 2021
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo   +8 more
doaj   +1 more source

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

open access: yesBaltic Journal of Law & Politics, 2017
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of ...
Faga Hemen Philip
doaj   +1 more source

Cybersecurity Practices for Social Media Users: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects ...
Thilini B. G. Herath   +2 more
doaj   +1 more source

Tracking advanced persistent threats in critical infrastructures through opinion dynamics [PDF]

open access: yes, 2018
Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect.
A Lemay   +10 more
core   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

CYBER SECURITY IN TRANSPORTATION

open access: yesInternational Journal of Advanced Studies
The fast pace of scientific and technological progress in terms of informatisation and digitalisation of society entails the risk of increasing cyber threats, which pose a serious problem for organisations, as the pace of development of digital and ...
Olga V. Knyazkina   +3 more
doaj   +1 more source

Predicting Cyber Events by Leveraging Hacker Sentiment

open access: yes, 2018
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy