Results 41 to 50 of about 34,930 (170)

Approaches to cyber weapons classification problem

open access: yesVestnik MGIMO-Universiteta, 2013
Article focuses on the problem of classification of modern and prospective cyber weapons. Suggested complex of characteristics, based on analytical approach allows for type determination for existing and future cyber weapons.
V. V. Kabernik
doaj   +1 more source

Bistatic 3D SAR for wall parameter extraction in cluttered environments

open access: yesElectronics Letters, 2021
Through‐wall radar is an emergent technology rooted in urban surveillance, a key component being synthetic aperture radar (SAR). Accurate through‐wall SAR relies on knowledge of the refractive index and thickness of any obscuring walls.
James Elgy, Daniel Andre, Mark Finnis
doaj   +1 more source

Keamanan Nasional dalam Menghadapi Perubahan Cyber Warfare

open access: yesJurnal Mercatoria, 2023
Artikel ini bertujuan untuk memperoleh gambaran tentang cyber warfare dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka mewujudkan keamanan nasional.
Elfirda Putri   +2 more
doaj   +1 more source

Beyond Manoeuvre Theory for European Defence

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley   +1 more source

A Definitional Framework for Cyber Warfare. The Ukrainian Aspect

open access: yesPolish Political Science Yearbook
The article outlines a position, expressing the view that cyberspace opens up a new dimension of politics, in which cyber campaigns have the potential to become an important means or alternative to warfare in order to achieve strategic advantage.
Marek Górka
doaj   +1 more source

WAR AND DEFENSE IN VIRTUAL SPACE [PDF]

open access: yesAnnals: Series on Military Sciences, 2018
In the information society, information - as a weapon, target and strategic raw material is at the root of all decisions. Information warfare has become an area of exceptional research and development, for which increased attention is paid, but also ...
Gheorghe BOARU
doaj  

Civilian Direct Participation in Cyber Hostilities

open access: yesIDP, 2014
This article studies the application of a well-known notion of international humanitarian law, civilian direct participation in hostilities, to cyber warfare.According to the principle of distinction, civilians and combatants must be distinguished in ...
François Delerue
doaj   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Similarity-Based Source Code Vulnerability Detection Leveraging Transformer Architecture: Harnessing Cross- Attention for Hierarchical Analysis

open access: yesIEEE Access
The growing complexity and volume of modern software have led to an increase in source code vulnerabilities, posing significant security risks. In response, deep learning-based automated source code vulnerability detection methods, particularly those ...
Sungmin Han   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy