Results 1 to 10 of about 77,587 (303)

Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]

open access: yes
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core  

Unweaving the Web: Beginning to think theologically about the Internet [PDF]

open access: yes, 2002
This is the author's version of the book.This book discusses features of the Internet that are new and theologically challenging and how these features affect the way we think about place, time, and ...
Clough, David
core  

Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy

open access: yesCybersecurity
The existing physical layer security schemes, which are based on the key generation model and the wire-tap channel model, achieve security by utilizing channel reciprocity entropy and noise entropy, respectively.
Chen An   +4 more
doaj   +1 more source

International Liability in Cyberspace [PDF]

open access: yes, 2001
Activities in cyberspace often expose companies to cybertorts , a species of tort particularly difficult to reconcile with standard insurance policies.
Crane, Matthew
core   +1 more source

Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems

open access: yesApplied Sciences
Industrial control systems (ICSs), which are fundamental to the operation of critical infrastructure, face increasingly sophisticated security threats due to the integration of information and operational technologies.
Yunkai Song   +3 more
doaj   +1 more source

Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]

open access: yes, 2019
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H.   +2 more
core   +1 more source

An Mcformer encoder integrating Mamba and Cgmlp for improved acoustic feature extraction

open access: yesScientific Reports
Currently, attention models based on the Conformer architecture have become mainstream in the field of speech recognition due to their integration of self-attention mechanisms and convolutional networks.
Nurmemet Yolwas   +6 more
doaj   +1 more source

Finding Impossible Differentials in ARX Ciphers under Weak Keys

open access: yesIACR Transactions on Symmetric Cryptology
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling   +6 more
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

Introduction to cyberspace security discipline

open access: yes网络与信息安全学报, 2019
With rapidly development of electronic information technology and industry, human society comes into information age. In the information age human lives and works in cyberspace. There for, it is the base requirement for human to ensure cyberspace security in the information age.
Huanguo ZHANG, Ruiying DU
openaire   +3 more sources

Home - About - Disclaimer - Privacy