The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.
This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area.
Martina, Eva
doaj
PhantomFS-v2: Dare You to Avoid This Trap
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques.
Jione Choi +8 more
doaj +1 more source
Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core +1 more source
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish +4 more
core +1 more source
From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius +2 more
wiley +1 more source
Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight
The Dark Web is an internet domain that ensures user anonymity and has increasingly become a focal point for illegal activities and a repository for information on cyberattacks owing to the challenges in tracking its users.
Gun-Yoon Shin +6 more
doaj +1 more source
Endmember Learning with K-Means through SCD Model in Hyperspectral Scene Reconstructions
This paper proposes a simple yet effective method for improving the efficiency of sparse coding dictionary learning (DL) with an implication of enhancing the ultimate usefulness of compressive sensing (CS) technology for practical applications, such as ...
Ayan Chatterjee, Peter W. T. Yuen
doaj +1 more source
Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten +3 more
core
The ‘Geopolitical Commission’: 40 Years in the Making?
Abstract In 2019, European Commission President Ursula von der Leyen promised MEPs she would deliver a ‘Geopolitical Commission’ during the five years of her term in office, unbeknown that the COVID‐19 pandemic and the Russian invasion of Ukraine were around the corner.
Robert Kissack
wiley +1 more source
CYBER WARFARE AND INTERNATIONAL CYBER LAW: WHITHER?
This paper analyses historical, sociological and normative aspects of the cyber violence in international relations and international law, aiming to assess the adequacy of the extant international norms for its regulation.
Miodrag N. Simović +2 more
doaj +1 more source

