Results 61 to 70 of about 34,930 (170)

The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

open access: yesActa Informatica Pragensia, 2014
This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area.
Martina, Eva
doaj  

PhantomFS-v2: Dare You to Avoid This Trap

open access: yesIEEE Access, 2020
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques.
Jione Choi   +8 more
doaj   +1 more source

Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]

open access: yes, 2017
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core   +1 more source

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius   +2 more
wiley   +1 more source

Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight

open access: yesIEEE Access
The Dark Web is an internet domain that ensures user anonymity and has increasingly become a focal point for illegal activities and a repository for information on cyberattacks owing to the challenges in tracking its users.
Gun-Yoon Shin   +6 more
doaj   +1 more source

Endmember Learning with K-Means through SCD Model in Hyperspectral Scene Reconstructions

open access: yesJournal of Imaging, 2019
This paper proposes a simple yet effective method for improving the efficiency of sparse coding dictionary learning (DL) with an implication of enhancing the ultimate usefulness of compressive sensing (CS) technology for practical applications, such as ...
Ayan Chatterjee, Peter W. T. Yuen
doaj   +1 more source

Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]

open access: yes, 2019
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten   +3 more
core  

The ‘Geopolitical Commission’: 40 Years in the Making?

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract In 2019, European Commission President Ursula von der Leyen promised MEPs she would deliver a ‘Geopolitical Commission’ during the five years of her term in office, unbeknown that the COVID‐19 pandemic and the Russian invasion of Ukraine were around the corner.
Robert Kissack
wiley   +1 more source

CYBER WARFARE AND INTERNATIONAL CYBER LAW: WHITHER?

open access: yesRevija za kriminologiju i krivično pravo, 2020
This paper analyses historical, sociological and normative aspects of the cyber violence in international relations and international law, aiming to assess the adequacy of the extant international norms for its regulation.
Miodrag N. Simović   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy