Results 31 to 40 of about 291,363 (254)
Deepfakes in Cyber Warfare: Threats, Detection, Techniques and Countermeasures
Technology known as deepfake (DT) has reached an entirely new level of complexity. Cybercriminals now have the ability to modify sounds, images, and videos in order to mislead individuals and businesses and spread false information.
Burak Çinar
semanticscholar +1 more source
Deception Jamming Against Doppler Beam Sharpening Radars
Missile seekers are becoming increasingly more capable of using Doppler Beam Sharpening (DBS) modes as part of the homing cycle, which requires new countermeasures against this mode.
Gareth Frazer +2 more
doaj +1 more source
Guerre à la Carte: Cyber, Information, Cognitive Warfare and the Metaverse
Hybrid warfare is currently among the most trending topics. Hybrid threats arise in digital, cybernetic, and virtual environments and materialise in the real world.
Marco Marsili
semanticscholar +1 more source
Just Warfare: Is a Nuclear Attack an appropriate Response to a Cyber Attack?
It is well known that nuclear weapons pose a grave threat to humanity because of their destructive power and to the lives of innocent civilians potentially affected by them. What might be less known are the grave effects that cyberwarfare can potentially
Alexia Fitz, Richard Wilson
semanticscholar +1 more source
With the proliferation of network systems, the boundaries between cyber and physical environments are blurring, leading to an increased risk of sophisticated cyber-attacks equipped with advanced technologies.
Younghoan Jang +6 more
doaj +1 more source
R&D Trend and Development Direction of Cyber Warfare Weapon System Technology
The cyber warfare weapon system is used to protect the information of South Korean forces from cyber threats and achieve superiority of the forces in cyberspace.
Minuk Kim
semanticscholar +1 more source
3-Cs of Cyberspace and Pakistan: Cybercrime, Cyber-Terrorism, and Cyber Warfare
This qualitative exploratory and embedded case study deliberates the nature of 3-Cs – cybercrime, cyber-terrorism, cyber warfare – against Pakistan. What are the three Cs and how are they impacting the state and society in Pakistan. How Pakistan has been
Muhammad Nadeem Mirza +6 more
semanticscholar +1 more source
Laboratory bistatic synthetic aperture radar coherent change detection investigation
Synthetic Aperture Radar (SAR) Coherent Change Detection (CCD) allows for the detection of very small scene changes. This is particularly useful for reconnaissance and surveillance as small changes such as vehicle tracks can be identified.
Alexander Hagelberg +2 more
doaj +1 more source
Purpose The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs).
James Pérez-Morón
semanticscholar +1 more source
Can Attrition Theory Provide Insight for Cyber Warfare?
This paper explores the notion that cyber-adversaries can use classic attrition tactics to cause weakness to address follow-on attacks. We conducted a grounded theory study that reviewed historic literature to identify parallels between past attrition ...
Stephen Defibaugh, D. Schaeffer
semanticscholar +1 more source

