Results 201 to 210 of about 291,363 (254)
Some of the next articles are maybe not open access.
International Journal of Computational and Experimental Science and Engineering
The current study suggests the national framework based on the concept of AI-enabled cyber threat intelligence systems. The increased risk of digital warfare and the shortcomings of the traditional patterns of cybersecurity.
Md Abubokor Siam +8 more
semanticscholar +1 more source
The current study suggests the national framework based on the concept of AI-enabled cyber threat intelligence systems. The increased risk of digital warfare and the shortcomings of the traditional patterns of cybersecurity.
Md Abubokor Siam +8 more
semanticscholar +1 more source
The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology, 2022
The Chinese People’s Liberation Army (PLA) intends to wage systems confrontation and system destruction warfare. “System-of-systems thinking drives how the PLA understands and seeks to win modern warfare … and to achieve integrated joint operations and ...
Robert Swallow
semanticscholar +1 more source
The Chinese People’s Liberation Army (PLA) intends to wage systems confrontation and system destruction warfare. “System-of-systems thinking drives how the PLA understands and seeks to win modern warfare … and to achieve integrated joint operations and ...
Robert Swallow
semanticscholar +1 more source
Humanizing Cyber War: A Geneva Conventions-based Framework for Cyber Warfare
International Conference on Cyber Warfare and SecurityCyber warfare has emerged as a defining threat of the 21st century, presenting unique challenges that existing international humanitarian laws, such as the Geneva Conventions, are ill-equipped to address. This paper proposes a framework equivalent to the
Shreyas Kumar +4 more
semanticscholar +1 more source
Stuxnet revisited: From cyber warfare to secret statecraft
The Journal of Strategic StudiesThe Stuxnet attack on Iran’s nuclear program is an outlier in the history of cyber conflict. While espionage and subversion are prevalent, serious cyber-physical damage remains rare.
Jon R. Lindsay
semanticscholar +1 more source
arXiv.org
Cyber warfare has become a central element of modern conflict, especially within multi-domain operations. As both a distinct and critical domain, cyber warfare requires integrating defensive and offensive technologies into coherent strategies.
Ya-Ting Yang, Quanyan Zhu
semanticscholar +1 more source
Cyber warfare has become a central element of modern conflict, especially within multi-domain operations. As both a distinct and critical domain, cyber warfare requires integrating defensive and offensive technologies into coherent strategies.
Ya-Ting Yang, Quanyan Zhu
semanticscholar +1 more source
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare
arXiv.orgWe are currently facing unprecedented cyber warfare with the rapid evolution of tactics, increasing asymmetry of intelligence, and the growing accessibility of hacking tools.
Tao Li, Quanyan Zhu
semanticscholar +1 more source
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
Social Science Research NetworkThis book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats.
Nicolae Sfetcu
semanticscholar +1 more source
Journal of Public Policy
This study examines the cyber warfare strategies employed during the 2021-2022 conflict between Russia and Ukraine, focusing on how technological developments in information and communication have influenced this aspect of modern warfare.
Khoirunnisa Khoirunnisa, Cristy Sugiati
semanticscholar +1 more source
This study examines the cyber warfare strategies employed during the 2021-2022 conflict between Russia and Ukraine, focusing on how technological developments in information and communication have influenced this aspect of modern warfare.
Khoirunnisa Khoirunnisa, Cristy Sugiati
semanticscholar +1 more source
2014
The advent of the Internet, and interconnected computer networks more generally, has impacted society in innumerable ways. Yet this new form of interconnectivity is a double-edged sword, turning dependency into vulnerability. As recent cyber attacks in past years have shown, the ability to cause havoc with far-reaching ramifications is a valid concern ...
openaire +3 more sources
The advent of the Internet, and interconnected computer networks more generally, has impacted society in innumerable ways. Yet this new form of interconnectivity is a double-edged sword, turning dependency into vulnerability. As recent cyber attacks in past years have shown, the ability to cause havoc with far-reaching ramifications is a valid concern ...
openaire +3 more sources
Offensive Cyber Operations: Understanding Intangible Warfare
RUSI Journal, 2022When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies ...
A. Colasanti
semanticscholar +1 more source

