Results 11 to 20 of about 291,363 (254)
Technological, military and social causes for the application of cyber warfare [PDF]
Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare.
Dragan D. Mladenović +2 more
doaj +1 more source
PhantomFS: File-Based Deception Technology for Thwarting Malicious Users
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have
Junghee Lee +4 more
doaj +1 more source
Strategic studies and cyber warfare
This article explores the fashion/popularity of the idea that the exercise of cyber power is a form of warfare. Specifically, the article explains the recent decline of the cyber warfare fashion in academia and discusses its implications for strategic ...
Samuel Žilinčík, I.G.B.M. Duyvesteyn
semanticscholar +1 more source
Acts of cyber warfare and cyber terrorism (CWCT) that target a nation's critical infrastructure (CI) are quickly becoming a larger threat to national security than conventional kinetic warfare strategies. Adversaries or potential adversaries can target a
R. Naidoo, Carla Jacobs
semanticscholar +1 more source
. The 2022 Russian invasion of Ukraine showcased the evolving nature of modern warfare, where cyber and information confrontations play a pivotal role alongside traditional kinetic engagements.
K. Fedotenko
semanticscholar +1 more source
Statistical analysis of in‐flight drone signatures
Drone‐monitoring radars typically integrate many pulses in order to improve signal to noise ratio and enable high detection performance. Over the course of this coherent processing interval (CPI), many components of the drone signature change and the ...
John Markow +2 more
doaj +1 more source
Nuclear Weapons, Cyber Warfare, and Cyber Security: Ethical and Anticipated Ethical Issues
In this paper, we discuss the interrelationship of nuclear weapons, cyber warfare, and cyber security. Some of the most significant cyber threats to nuclear stability are now due to the intersection of technologies related to nuclear weapons and ...
Richard E. Wilson, Alexia Fitz
semanticscholar +1 more source
Millimeter-wave (W-band) radar measurements were taken for two maritime targets instrumented with attitude and heading reference systems (AHRSs) in a littoral environment with the aim of developing a multiaspect classifier.
Tomasz Jasinski +2 more
doaj +1 more source
Developing Robust Cyber Warfare Capabilities for the African Battlespace
The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and effectively.
J. Mtsweni, M. Thaba
semanticscholar +1 more source
PUGTIFs: Passively User-Generated Thermal Invariant Features
Feature detection is a vital aspect of computer vision applications, but adverse environments, distance and illumination can affect the quality and repeatability of features or even prevent their identification. Invariance to these constraints would make
Edward Jackson, Lounis Chermak
doaj +1 more source

