Results 21 to 30 of about 291,363 (254)

INDIA'S CYBER WARFARE CAPABILITIES: REPERCUSSIONS FOR PAKISTAN'S NATIONAL SECURITY

open access: yesNDU Journal, 2023
Cyber warfare refers to a state's ability to penetrate another state's digital systems to cause disruption. Cyber warfare has emerged as the fifth operational warfighting domain. India has been strengthening its cyber warfare capabilities for a long time,
Ms. Nageen Ashraf   +1 more
semanticscholar   +1 more source

Protective Emblems in Cyber Warfare [PDF]

open access: yes, 2012
The Tallinn Manual will be released in February 2013 and makes a significant step towards defining the concepts of cyber warfare. The early draft of the manual is available and the expert working party have interpreted the existing international ...
Blyth, Andrew   +3 more
core   +2 more sources

Design of a Tunable Snapshot Multispectral Imaging System through Ray Tracing Simulation

open access: yesJournal of Imaging, 2019
Research on snapshot multispectral imaging has been popular in the remote sensing community due to the high demands of video-rate remote sensing system for various applications.
Mengjia Ding   +8 more
doaj   +1 more source

Study on Cyber Attack Damage Assessment Framework

open access: yesIEEE Access, 2022
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim   +4 more
doaj   +1 more source

Lesson Plan: An Interdisciplinary Approach to Teaching Cyber Warfare Concepts

open access: yesInternational Conference on Cyber Warfare and Security, 2023
Interdisciplinary topics and fields need special attention to ensure that the breadth of the knowledge they represent are completely expressed. This is especially important and difficult to achieve in curriculum areas that tend to add new ideas on a ...
D. Schaeffer, P. Olson
semanticscholar   +1 more source

Hunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector

open access: yesIEEE Access, 2021
A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks are
Seongyun Seo   +6 more
doaj   +1 more source

Just cyber war?: Casus belli, information ethics, and the human perspective [PDF]

open access: yes, 2017
Does the advent of cyber-war require us to abandon the traditional ethical framework for thinking about the morality of warfare - just war theory - and develop principles specific to the unique nature of cyber-attacks?
Arquilla   +11 more
core   +1 more source

How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector

open access: yesInternational Journal of Security Privacy and Trust Management, 2023
A pair of attacks on energy sector assets offers a unique opportunity to better understand the differences in impact from cyber and kinetic warfare. A review of the 2021 cyber attack on Colonial Pipeline and the missile strike on the Syvash wind farm ...
Tom Johansmeyer
semanticscholar   +1 more source

Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]

open access: yes, 2019
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss   +15 more
core   +2 more sources

Cyber Analogies [PDF]

open access: yes, 2014
This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it.

core   +1 more source

Home - About - Disclaimer - Privacy