Results 81 to 90 of about 1,657,998 (333)

The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

open access: yesBaltic Journal of Law & Politics, 2017
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of ...
Faga Hemen Philip
doaj   +1 more source

Russian-Estonian Relations After 2007: Current Status and Development Prospects [PDF]

open access: yes, 2011
The article highlights the major points that have influenced relations between Russia and Estonia after 2007. These relations were rather poor during the post-Soviet period.
Włodarska-Frykowska, Agata
core   +2 more sources

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

Cyber-Physical War Gaming

open access: yes, 2017
This paper presents general strategies for cyber war gaming of Cyber-Physical Systems (CPSs) that are used for cyber security research at the U.S. Army Research Laboratory (ARL). Since Supervisory Control and Data Acquisition (SCADA) and other CPSs are operational systems, it is difficult or impossible to perform security experiments on actual systems.
Colbert, E. J. M.   +2 more
openaire   +2 more sources

The North Atlantic alliance and collective defense at 70: confession and response revisited [PDF]

open access: yes, 2019
The North Atlantic Treaty was largely a response to global sentiment that other international organizations, namely the United Nations, were not accomplishing their intended purpose of the maintenance and promotion of peace and order in the world.
Schmitt, Michael
core   +1 more source

Deep Learning Methods for Assessing Time‐Variant Nonlinear Signatures in Clutter Echoes

open access: yesAdvanced Intelligent Systems, EarlyView.
Motion classification from biosonar echoes in clutter presents a fundamental challenge: extracting structured information from stochastic interference. Deep learning successfully discriminates object speed and direction from bat‐inspired signals, achieving 97% accuracy with frequency‐modulated calls but only 48% with constant‐frequency tones. This work
Ibrahim Eshera   +2 more
wiley   +1 more source

Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]

open access: yes, 2019
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H.   +2 more
core   +1 more source

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

Cyber ttacks - Russian Federation's mechanicm of influence in Ukraine [PDF]

open access: yesAnte Portas
Currently, the international community is facing a hybrid conflict in Ukraine, where traditional and cyber weapons are being used at the same time. The big surprise of the Russian invasion was the apparent absence of a major cyber war.
Victoria Bevziuc, Svetlana Cebotari
doaj  

Cyber Technology and Arms Race

open access: yes, 2017
Cyber technology represents digital military capability with the purpose of causing damage to the military strength and the social infrastructure of a potential enemy.
Kanniainen, Vesa
core  

Home - About - Disclaimer - Privacy