Results 1 to 10 of about 96,539 (341)

Cyber War Game in Temporal Networks. [PDF]

open access: yesPLoS ONE, 2016
In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort.
Jin-Hee Cho, Jianxi Gao
doaj   +6 more sources

Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius [PDF]

open access: greenInternet Policy Review, 2020
This contribution discusses the growing importance of cyber attacks directed at the public sphere and the crucial role of non-state actors in cyber attacks from a perspective of just war theory.
Johannes Thumfart
doaj   +4 more sources

Cyber War - Trends and Technologies [PDF]

open access: diamondNational security and the future, 2021
Cyberspace has become an indispensable part in which special operations such as cyber war or warfare take place. The role of special war as the use of so-called soft power was emphasized. The country's number of potential adversaries in cyber warfare is unlimited, making highly endangered aspects of cyber civilian infrastructure, which is essentially ...
Darko Trifunović, Zoran Bjelica
openaire   +4 more sources

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yesJournal of Strategic Security, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Audrey Guinchard
doaj   +4 more sources

CYBER DIMENSION OF HYBRID WARS: ESCAPING A ‘GREY ZONE’ OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES

open access: goldBaltic Journal of Economic Studies, 2022
The subject of the article is the international and national legal aspects of compensation for economic damages caused by cyber attacks. The purpose of the article is to contribute to the ongoing debate on attribution and liability for malicious and ...
Nataliia Mazaraki, Yulia Goncharova
doaj   +3 more sources

Reintegration of cyber veterans: challenges and strategies for post-war transition [PDF]

open access: yesFrontiers in Psychology
Battles in the cyber domain often lack visibility compared to the physical domain, which can lead to insufficient appreciation of its actors’ achievements by the general public and society.
Toni Virtanen   +6 more
doaj   +2 more sources

Cyber Crime & Cyber War – "Part of the Game": Cyber Security, Quo Vadis?

open access: yesMedienimpulse, 2015
Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten?
Karl H. Stingeder
doaj   +2 more sources

Cyber Security without Cyber War

open access: greenJournal of Conflict and Security Law, 2012
Which government agency should have primary responsibility for the Internet? The USA seems to have decided this question in favour of the military—the US military today has the largest concentration of expertise and legal authority with respect to cyberspace.
Mary Ellen O’Connell
openaire   +3 more sources

The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors [PDF]

open access: green, 2013
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use
Christopher DeLuca
openalex   +3 more sources

The war of attrition in cyber-space or "cyber-attacks", "cyber-war" and "cyber-terrorism"

open access: green, 2013
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente denominado como ciberespaço – tem um lado negro. Este lado negro tem várias dimensões, nomeadamente perda de produtividade, crime financeiro, furto de propriedade intelectual, de identidade, bullying e outros.
Eduardo Gelbstein
openaire   +3 more sources

Home - About - Disclaimer - Privacy