Results 11 to 20 of about 34,930 (170)

PUGTIFs: Passively User-Generated Thermal Invariant Features

open access: yesIEEE Access, 2019
Feature detection is a vital aspect of computer vision applications, but adverse environments, distance and illumination can affect the quality and repeatability of features or even prevent their identification. Invariance to these constraints would make
Edward Jackson, Lounis Chermak
doaj   +1 more source

Protective Emblems in Cyber Warfare [PDF]

open access: yes, 2012
The Tallinn Manual will be released in February 2013 and makes a significant step towards defining the concepts of cyber warfare. The early draft of the manual is available and the expert working party have interpreted the existing international ...
Blyth, Andrew   +3 more
core   +2 more sources

Design of a Tunable Snapshot Multispectral Imaging System through Ray Tracing Simulation

open access: yesJournal of Imaging, 2019
Research on snapshot multispectral imaging has been popular in the remote sensing community due to the high demands of video-rate remote sensing system for various applications.
Mengjia Ding   +8 more
doaj   +1 more source

Study on Cyber Attack Damage Assessment Framework

open access: yesIEEE Access, 2022
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim   +4 more
doaj   +1 more source

Just cyber war?: Casus belli, information ethics, and the human perspective [PDF]

open access: yes, 2017
Does the advent of cyber-war require us to abandon the traditional ethical framework for thinking about the morality of warfare - just war theory - and develop principles specific to the unique nature of cyber-attacks?
Arquilla   +11 more
core   +1 more source

Hunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector

open access: yesIEEE Access, 2021
A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks are
Seongyun Seo   +6 more
doaj   +1 more source

Cyber Analogies [PDF]

open access: yes, 2014
This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it.

core   +1 more source

Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]

open access: yes, 2019
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss   +15 more
core   +2 more sources

Deception Jamming Against Doppler Beam Sharpening Radars

open access: yesIEEE Access, 2020
Missile seekers are becoming increasingly more capable of using Doppler Beam Sharpening (DBS) modes as part of the homing cycle, which requires new countermeasures against this mode.
Gareth Frazer   +2 more
doaj   +1 more source

An Investigation of Learning Model Technologies for Network Traffic Classification Design in Cyber Security Exercises

open access: yesIEEE Access, 2023
With the proliferation of network systems, the boundaries between cyber and physical environments are blurring, leading to an increased risk of sophisticated cyber-attacks equipped with advanced technologies.
Younghoan Jang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy