Results 211 to 220 of about 291,363 (254)
Some of the next articles are maybe not open access.
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2004
We define and analyze a new concept in the field of cyber warfare - cyber warfare peacekeeping. We identify that in some parts of the world low intensity cyber warfare has been conducted for over three years. The PRC and Taiwan (among others) have established independent elements in their armed forces devoted to cyber warfare.
T.P. Cahill, K. Rozinov, C. Mule
openaire +1 more source
We define and analyze a new concept in the field of cyber warfare - cyber warfare peacekeeping. We identify that in some parts of the world low intensity cyber warfare has been conducted for over three years. The PRC and Taiwan (among others) have established independent elements in their armed forces devoted to cyber warfare.
T.P. Cahill, K. Rozinov, C. Mule
openaire +1 more source
ISSRA Papers, 2021
Technological advancement is always a disruptive process; its impact on society, economics, politics, military and strategic affairs are profound but it takes a certain amount of time before the effects are visible. Cyberspace has been termed as the battlefield of the 21st century. It is considered the most potent threat to international security. With
openaire +1 more source
Technological advancement is always a disruptive process; its impact on society, economics, politics, military and strategic affairs are profound but it takes a certain amount of time before the effects are visible. Cyberspace has been termed as the battlefield of the 21st century. It is considered the most potent threat to international security. With
openaire +1 more source
Cyber Warfare and Cyber Terrorism
SSRN Electronic Journal, 2012The advent of Internet is the most important development of the modern day communication system but it has brought a new age of crime, termed as cyber crimes. The paper majorly focuses on the two common types of cyber crimes - Cyber Warfare and Cyber Terrorism, although the concept of the two appears to be similar.
openaire +1 more source
Global Change, Peace & Security, 2011
Inside cyber warfare, by Jeffery Carr, Sebastopol, California, O'Reilly Media, 2010, xviii + 212 pp., $66.00 (paperback), ISBN 978-0-596-80215 ...
openaire +1 more source
Inside cyber warfare, by Jeffery Carr, Sebastopol, California, O'Reilly Media, 2010, xviii + 212 pp., $66.00 (paperback), ISBN 978-0-596-80215 ...
openaire +1 more source
Cyber Weapons and Cyber Warfare
2018A cyber attack is any type of offensive action employed by nation-states, individuals, groups, or organizations that targets computer information systems, infrastructures, computer networks, or personal computer devices by various means of malicious acts.
openaire +1 more source
Deep Learning-based Anomaly Detection in Cyber-physical Systems
ACM Computing Surveys, 2022Yuan Luo, Guojun Peng
exaly
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
ACM Computing Surveys, 2022Ishai Rosenberg, Asaf Shabtai
exaly
2019
There is an awful lot of hype and confusion surrounding the concept of cyber warfare. It is certainly a term that has gained traction recently in the media and in military and government discussions. As ambiguous as the term cyber is itself, cyber warfare seems to suffer from even more variance and mischaracterization in its definition, doctrine, and ...
openaire +1 more source
There is an awful lot of hype and confusion surrounding the concept of cyber warfare. It is certainly a term that has gained traction recently in the media and in military and government discussions. As ambiguous as the term cyber is itself, cyber warfare seems to suffer from even more variance and mischaracterization in its definition, doctrine, and ...
openaire +1 more source

