Results 41 to 50 of about 34,930 (170)
Approaches to cyber weapons classification problem
Article focuses on the problem of classification of modern and prospective cyber weapons. Suggested complex of characteristics, based on analytical approach allows for type determination for existing and future cyber weapons.
V. V. Kabernik
doaj +1 more source
Bistatic 3D SAR for wall parameter extraction in cluttered environments
Through‐wall radar is an emergent technology rooted in urban surveillance, a key component being synthetic aperture radar (SAR). Accurate through‐wall SAR relies on knowledge of the refractive index and thickness of any obscuring walls.
James Elgy, Daniel Andre, Mark Finnis
doaj +1 more source
Keamanan Nasional dalam Menghadapi Perubahan Cyber Warfare
Artikel ini bertujuan untuk memperoleh gambaran tentang cyber warfare dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka mewujudkan keamanan nasional.
Elfirda Putri +2 more
doaj +1 more source
Beyond Manoeuvre Theory for European Defence
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley +1 more source
A Definitional Framework for Cyber Warfare. The Ukrainian Aspect
The article outlines a position, expressing the view that cyberspace opens up a new dimension of politics, in which cyber campaigns have the potential to become an important means or alternative to warfare in order to achieve strategic advantage.
Marek Górka
doaj +1 more source
WAR AND DEFENSE IN VIRTUAL SPACE [PDF]
In the information society, information - as a weapon, target and strategic raw material is at the root of all decisions. Information warfare has become an area of exceptional research and development, for which increased attention is paid, but also ...
Gheorghe BOARU
doaj
Civilian Direct Participation in Cyber Hostilities
This article studies the application of a well-known notion of international humanitarian law, civilian direct participation in hostilities, to cyber warfare.According to the principle of distinction, civilians and combatants must be distinguished in ...
François Delerue
doaj +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
The growing complexity and volume of modern software have led to an increase in source code vulnerabilities, posing significant security risks. In response, deep learning-based automated source code vulnerability detection methods, particularly those ...
Sungmin Han +5 more
doaj +1 more source

