Results 31 to 40 of about 291,363 (254)

Deepfakes in Cyber Warfare: Threats, Detection, Techniques and Countermeasures

open access: yesAsian Journal of Research in Computer Science, 2023
Technology known as deepfake (DT) has reached an entirely new level of complexity. Cybercriminals now have the ability to modify sounds, images, and videos in order to mislead individuals and businesses and spread false information.
Burak Çinar
semanticscholar   +1 more source

Deception Jamming Against Doppler Beam Sharpening Radars

open access: yesIEEE Access, 2020
Missile seekers are becoming increasingly more capable of using Doppler Beam Sharpening (DBS) modes as part of the homing cycle, which requires new countermeasures against this mode.
Gareth Frazer   +2 more
doaj   +1 more source

Guerre à la Carte: Cyber, Information, Cognitive Warfare and the Metaverse

open access: yesApplied Cybersecurity & Internet Governance, 2023
Hybrid warfare is currently among the most trending topics. Hybrid threats arise in digital, cybernetic, and virtual environments and materialise in the real world.
Marco Marsili
semanticscholar   +1 more source

Just Warfare: Is a Nuclear Attack an appropriate Response to a Cyber Attack?

open access: yesInternational Conference on Cyber Warfare and Security, 2023
It is well known that nuclear weapons pose a grave threat to humanity because of their destructive power and to the lives of innocent civilians potentially affected by them. What might be less known are the grave effects that cyberwarfare can potentially
Alexia Fitz, Richard Wilson
semanticscholar   +1 more source

An Investigation of Learning Model Technologies for Network Traffic Classification Design in Cyber Security Exercises

open access: yesIEEE Access, 2023
With the proliferation of network systems, the boundaries between cyber and physical environments are blurring, leading to an increased risk of sophisticated cyber-attacks equipped with advanced technologies.
Younghoan Jang   +6 more
doaj   +1 more source

R&D Trend and Development Direction of Cyber Warfare Weapon System Technology

open access: yesJournal of the Korea Academia-Industrial cooperation Society, 2022
The cyber warfare weapon system is used to protect the information of South Korean forces from cyber threats and achieve superiority of the forces in cyberspace.
Minuk Kim
semanticscholar   +1 more source

3-Cs of Cyberspace and Pakistan: Cybercrime, Cyber-Terrorism, and Cyber Warfare

open access: yesStrategic Studies, 2022
This qualitative exploratory and embedded case study deliberates the nature of 3-Cs – cybercrime, cyber-terrorism, cyber warfare – against Pakistan. What are the three Cs and how are they impacting the state and society in Pakistan. How Pakistan has been
Muhammad Nadeem Mirza   +6 more
semanticscholar   +1 more source

Laboratory bistatic synthetic aperture radar coherent change detection investigation

open access: yesElectronics Letters, 2023
Synthetic Aperture Radar (SAR) Coherent Change Detection (CCD) allows for the detection of very small scene changes. This is particularly useful for reconnaissance and surveillance as small changes such as vehicle tracks can be identified.
Alexander Hagelberg   +2 more
doaj   +1 more source

Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda

open access: yesJournal of Asia Business Studies, 2021
Purpose The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs).
James Pérez-Morón
semanticscholar   +1 more source

Can Attrition Theory Provide Insight for Cyber Warfare?

open access: yesInternational Conference on Cyber Warfare and Security, 2022
This paper explores the notion that cyber-adversaries can use classic attrition tactics to cause weakness to address follow-on attacks. We conducted a grounded theory study that reviewed historic literature to identify parallels between past attrition ...
Stephen Defibaugh, D. Schaeffer
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy