Results 271 to 280 of about 1,657,998 (333)
Some of the next articles are maybe not open access.
Defense & Security Analysis
After Russia’s massive Cyber-attacks on Ukraine’s government and bank sectors in January–February 2022, many analysts alleged that Cyber-power would be a crucial component of Russia’s military victory in Ukraine.
Roman Kolodii
semanticscholar +1 more source
After Russia’s massive Cyber-attacks on Ukraine’s government and bank sectors in January–February 2022, many analysts alleged that Cyber-power would be a crucial component of Russia’s military victory in Ukraine.
Roman Kolodii
semanticscholar +1 more source
Taxonomy of Cyber Attack Weapons, Defense Strategies, and Cyber War Incidents
Advances in Digital Crime, Forensics, and Cyber Terrorism, 2019Cyber security is the newest internal concern of this century where different technologies developed through telecommunication, computers, and internet are used in the international arena as cyber-weapons. This chapter provides in-depth information about
Arif Sari, Ugur Can Atasoy
semanticscholar +1 more source
Intelligence and national security
The Russian war on Ukraine presents a multifaceted landscape for the analysis of the cyber dimensions of contemporary war and their strategic, operational, and tactical impacts.
Aaron F. Brantly, N. Brantly
semanticscholar +1 more source
The Russian war on Ukraine presents a multifaceted landscape for the analysis of the cyber dimensions of contemporary war and their strategic, operational, and tactical impacts.
Aaron F. Brantly, N. Brantly
semanticscholar +1 more source
Journal of the Institution of Electronics and Telecommunication Engineers
In this paper, the graph sample and aggregate-attention network with war strategy optimization algorithm for cyber security in the 5G wireless communication network (CS-5GWCN-GSAAN-WSOA) is proposed in 5G mobile networks to identify cyber threats ...
D. Shobana, B. Priya, V. Samuthira Pandi
semanticscholar +1 more source
In this paper, the graph sample and aggregate-attention network with war strategy optimization algorithm for cyber security in the 5G wireless communication network (CS-5GWCN-GSAAN-WSOA) is proposed in 5G mobile networks to identify cyber threats ...
D. Shobana, B. Priya, V. Samuthira Pandi
semanticscholar +1 more source
Cyber Security without Cyber War
Journal of Conflict and Security Law, 2012Which government agency should have primary responsibility for the Internet? The USA seems to have decided this question in favour of the military—the US military today has the largest concentration of expertise and legal authority with respect to cyberspace.
openaire +1 more source
2015
PART I: FOUNDATIONAL QUESTIONS OF CYBERWAR 7. RE-THINKING THE BOUNDARIES OF LAW IN CYBERSPACE: A DUTY TO HACK? 10.
openaire +1 more source
PART I: FOUNDATIONAL QUESTIONS OF CYBERWAR 7. RE-THINKING THE BOUNDARIES OF LAW IN CYBERSPACE: A DUTY TO HACK? 10.
openaire +1 more source
Cyber Jihad: Waging War Through Social Media to Defend Islamic Values
Solo International Collaboration and Publication of Social Sciences and HumanitiesIn the modern digital era, the phenomenon of cyber jihad has emerged as a strategy used by various groups and individuals to wage war through social media to defend Islamic values.
Yusi Mardiah Cahyani, Muthoifin
semanticscholar +1 more source
Engineering & Technology, 2010
Online security experts have downplayed speculation around the possibility of a 'cyber war' breaking out between sovereign states as a result of offensive action, amid calls for new laws enabling greater governmental control over the US national interconnection infrastructure.
openaire +1 more source
Online security experts have downplayed speculation around the possibility of a 'cyber war' breaking out between sovereign states as a result of offensive action, amid calls for new laws enabling greater governmental control over the US national interconnection infrastructure.
openaire +1 more source
Critical Review, 2009
ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences.
openaire +1 more source
ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences.
openaire +1 more source
Cyber Wars and Cyber Threats Against Mobile Devices
2023In recent years, the electronic device that has been used and bought the most by the consumers is mobile devices. Recently, there has been a significant increase in cyber crimes committed using mobile devices. It has been seen that this situation has become more critical with the widespread use of mobile devices in society, and it is of great ...
Hamza Kayabaş, Gurkan Tuna
openaire +1 more source

