Results 111 to 120 of about 291,363 (254)
"Out of the loop": autonomous weapon systems and the law of armed conflict [PDF]
The introduction of autonomous weapon systems into the “battlespace” will profoundly influence the nature of future warfare. This reality has begun to draw the attention of the international legal community, with increasing calls for an outright ban on ...
Schmitt, Michael N. +1 more
core
A Novel Ku‐Band Waveguide Piezo‐Electric Air Gap Capacitor Using a Single Tuning Element
In this work, a tuning element with controllable air gap integrated and implemented in a rectangular Ku‐band WR62 waveguide is presented. The proposed tuning element concept, consists of two, top and bottom, thin conductive parallelepiped arms, which are
Abraham Loutridis +3 more
doaj +1 more source
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS [PDF]
Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged.
Dan-Iulian VOITAŞEC
doaj
Shortly after the article that follows was drafted, I was notified that I had been nominated for promotion to vice admiral and assignment as Superintendent of the U.S. Naval Academy.
Carter, Walter E. Ted, Jackson, John E.
core +1 more source
Cyber Warfare and Implications
Cyberwarfare encompasses the actions by any international organization to attack and try to cause damage to another nation's infrastructure, computers or information systems through computer viruses or denial-of-service (DOS) attacks. Cyberwarfare is also known as the use or affecting in a battlespace or warfare in the background of computers, online ...
openaire +1 more source
Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core
Cyberterrorism: the story so far [PDF]
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same.
Conway, Maura
core
MEANS AND METHODS OF CYBER WARFARE [PDF]
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of
Dan-Iulian VOITAȘEC
doaj
Framework for Network Topology Generation and Traffic Prediction Analytics for Cyber Exercises
Today’s cyber-attacks have become increasingly sophisticated and diverse, targeting systems that hold sensitive information, creating the need for continuous cyber exercise and skill development for cyber professionals.
Dong-Wook Kim +6 more
doaj +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source

