Today's the advancements of technology have an impact on many aspects of life, including health, education, transportation, business, information communication, and government administration. Nonetheless, given the strong relationship between technology
Andyta Sekar Pratiwi +2 more
doaj +2 more sources
A cyber warfare perspective on risks related to health IoT devices and contact tracing. [PDF]
The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase the effectiveness of the countermeasures and the pervasiveness of monitoring and prevention.
Bobbio A +5 more
europepmc +2 more sources
A Definitional Framework for Cyber Warfare. The Ukrainian Aspect
The article outlines a position, expressing the view that cyberspace opens up a new dimension of politics, in which cyber campaigns have the potential to become an important means or alternative to warfare in order to achieve strategic advantage.
Marek Górka
doaj +2 more sources
Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse ...
Dragan D. Mladenović +2 more
doaj +3 more sources
D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield. [PDF]
Currently, in the field of military modernization, tactical networks using advanced unmanned aerial vehicle systems, such as drones, place an emphasis on proactively preventing operational limiting factors produced by cyber-electronic warfare threats and
Seo S, Han S, Kim D.
europepmc +2 more sources
INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age.
Ahmad Candra +2 more
doaj +2 more sources
Unconventional cyber warfare: cyber opportunities in unconventional warfare [PDF]
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S. will need to examine new and innovative ways to modernize its irregular warfare fighting capabilities. Within its irregular warfare capabilities, the U.S.
Eidman, Christopher R. +1 more
openaire +3 more sources
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia +5 more
doaj +1 more source
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source
Sidelobe Suppression Techniques for Near-Field Multistatic SAR
Multirotor Unmanned Air Systems (UAS) represent a significant improvement in capability for Synthetic Aperture Radar (SAR) imaging when compared to traditional, fixed-wing, platforms.
George A. J. Price +3 more
doaj +1 more source

