Results 131 to 140 of about 1,657,998 (333)
Cyber-attacks and International Law of Armed Conflicts; a “Jus Ad Bellum†Perspective [PDF]
This article highlights legal problems of cyber attacks from a ‘jus ad bellum’ perspective (International dispositions regarding the justification for entering a war). Since no International instrument whatsoever cover the cyber attacks the analogies
Remus, T. (Titiriga)
core
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source
CHALLENGES OF GRANTING THE STATUS OF CASUS BELLI TO A CYBERATTACK ON A NATO MEMBER STATE
The article analyzes the problems associated with recognizing a cyberattack on a NATO member state as a reason to declare war (casus belli). The article reveals the evolution of the Alliance's approaches to the issues of cyber threats and cyber defense ...
KHODANOV Andrei Ivanovich
doaj +1 more source
“On target”: precision and balance in the contemporary law of targeting [PDF]
The law of targeting lies at the heart of international humanitarian law (IHL). As such it is the fulcrum around which discussion of combat operations revolves.
Schmitt, Michael N., Widmar, Eric
core
EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley +1 more source
Human Trafficking and Terrorism: Utilizing National Security Resources to Prevent Human Trafficking in the Islamic State [PDF]
This is a report of a Master’s thesis done in behalf of the local network in Stockholm, under Fortum Distribution AB. The thesis was to conduct a review of a distribution station named Fs Myrängen located in Täby.
Welch, Shannon A.
core +1 more source
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen +4 more
wiley +1 more source
The war of attrition in cyber-space or "cyber-attacks", "cyber-war" and "cyber-terrorism"
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente denominado como ciberespaço – tem um lado negro. Este lado negro tem várias dimensões, nomeadamente perda de produtividade, crime financeiro, furto de propriedade intelectual, de identidade, bullying e outros.
openaire +1 more source
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang +6 more
wiley +1 more source
The article examines the issues of cyber risk management in the business strategies of healthcare institutions operating in the European Union, in order to ensure the digital protection of patients and reduce potential negative economic losses.
Oleh Zaiarnyi
doaj +1 more source

