Results 31 to 40 of about 96,539 (341)

Data Twin-Driven Cyber-Physical Factory for Smart Manufacturing

open access: yesSensors, 2022
Because of the complex production processes and technology-intensive operations that take place in the aerospace and defense industry, introducing Industry 4.0 into the manufacturing processes of aircraft composite materials is inevitable.
Jung-Sing Jwo   +2 more
doaj   +1 more source

STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA SELF-HELP ATAU MULTILATERALISM?

open access: yesJurnal Asia Pacific Studies, 2020
Cyber security is a new kind of topic in security studies. This issue came as prominent discourse when all the human aspect range from politics, military, economics and societal are connected to the cyber space. Cyber terrorism, cyber crime and cyber war
Iqbal Ramadhan
doaj   +1 more source

NEW THREATS TO THE NATIONAL SECURITY OF STATES – CYBER THREAT [PDF]

open access: yesScientific Journal of Silesian University of Technology. Series Transport, 2020
Globalisation brought an electronic communications reliance, as well as some repercussions on the world’s states, mainly in the sphere of cyber security. In recent years after the events in Ukraine, the cyber threat became a certainty and risk.
Daniel-Cornel ŞTEFĂNESCU, Alina PAPOI
doaj   +1 more source

Military objectives in cyber warfare [PDF]

open access: yes, 2017
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers   +21 more
core   +1 more source

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Cybersecurity Risks: Are They Inflated? [PDF]

open access: yesSalus Journal, 2016
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj  

Study on Cyber Attack Damage Assessment Framework

open access: yesIEEE Access, 2022
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim   +4 more
doaj   +1 more source

A discourse in conflict : resolving the definitional uncertainty of cyber war : a thesis presented in partial fulfilment for the requirements for the degree of Master of Arts in Defence and Security Studies at Massey University, Albany, New Zealand [PDF]

open access: yes, 2017
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved.
Hughes, Dan
core  

Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]

open access: yes, 2019
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss   +15 more
core   +2 more sources

Constructing Ionic Fast Diffusion Channels on LiNi0.5Mn1.5O4 for Lithium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A dual‐modification strategy is developed for LNMO cathode, where bulk Ti doping stabilizes the oxygen framework and simultaneously drives the in situ formation of LaTi2O6 nano‐islands as ion diffusion channels on (111) surfaces, enabling high‐rate capacity (∼100 mAh g−1 at 30 C) and excellent cycling retention (87.8% after 1000 cycles).
Xinyi Zhang   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy