Results 11 to 20 of about 291,363 (254)

Technological, military and social causes for the application of cyber warfare [PDF]

open access: yesVojnotehnički Glasnik, 2012
Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare.
Dragan D. Mladenović   +2 more
doaj   +1 more source

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

open access: yesIEEE Access, 2020
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have
Junghee Lee   +4 more
doaj   +1 more source

Strategic studies and cyber warfare

open access: yesThe Journal of Strategic Studies, 2023
This article explores the fashion/popularity of the idea that the exercise of cyber power is a form of warfare. Specifically, the article explains the recent decline of the cyber warfare fashion in academia and discusses its implications for strategic ...
Samuel Žilinčík, I.G.B.M. Duyvesteyn
semanticscholar   +1 more source

Cyber Warfare and Cyber Terrorism Threats Targeting Critical Infrastructure: A HCPS-based Threat Modelling Intelligence Framework

open access: yesEuropean Conference on Cyber Warfare and Security, 2023
Acts of cyber warfare and cyber terrorism (CWCT) that target a nation's critical infrastructure (CI) are quickly becoming a larger threat to national security than conventional kinetic warfare strategies. Adversaries or potential adversaries can target a
R. Naidoo, Carla Jacobs
semanticscholar   +1 more source

CYBER WARFARE AS PART OF INFORMATION WARFARE OF RUSSIA AGAINST UKRAINE SINCE THE BEGINNING OF THE 2022 RUSSIAN INVASION

open access: yesVěda a perspektivy, 2023
. The 2022 Russian invasion of Ukraine showcased the evolving nature of modern warfare, where cyber and information confrontations play a pivotal role alongside traditional kinetic engagements.
K. Fedotenko
semanticscholar   +1 more source

Statistical analysis of in‐flight drone signatures

open access: yesIET Radar, Sonar & Navigation, 2022
Drone‐monitoring radars typically integrate many pulses in order to improve signal to noise ratio and enable high detection performance. Over the course of this coherent processing interval (CPI), many components of the drone signature change and the ...
John Markow   +2 more
doaj   +1 more source

Nuclear Weapons, Cyber Warfare, and Cyber Security: Ethical and Anticipated Ethical Issues

open access: yesInternational Conference on Cyber Warfare and Security, 2023
     In this paper, we discuss the interrelationship of nuclear weapons, cyber warfare, and cyber security. Some of the most significant cyber threats to nuclear stability are now due to the intersection of technologies related to nuclear weapons and ...
Richard E. Wilson, Alexia Fitz
semanticscholar   +1 more source

W-Band Multi-Aspect High Resolution Range Profile Radar Target Classification Using Support Vector Machines

open access: yesSensors, 2021
Millimeter-wave (W-band) radar measurements were taken for two maritime targets instrumented with attitude and heading reference systems (AHRSs) in a littoral environment with the aim of developing a multiaspect classifier.
Tomasz Jasinski   +2 more
doaj   +1 more source

Developing Robust Cyber Warfare Capabilities for the African Battlespace

open access: yesEuropean Conference on Cyber Warfare and Security, 2023
The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and effectively.
J. Mtsweni, M. Thaba
semanticscholar   +1 more source

PUGTIFs: Passively User-Generated Thermal Invariant Features

open access: yesIEEE Access, 2019
Feature detection is a vital aspect of computer vision applications, but adverse environments, distance and illumination can affect the quality and repeatability of features or even prevent their identification. Invariance to these constraints would make
Edward Jackson, Lounis Chermak
doaj   +1 more source

Home - About - Disclaimer - Privacy