Results 1 to 10 of about 77,587 (303)
Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core
Unweaving the Web: Beginning to think theologically about the Internet [PDF]
This is the author's version of the book.This book discusses features of the Internet that are new and theologically challenging and how these features affect the way we think about place, time, and ...
Clough, David
core
The existing physical layer security schemes, which are based on the key generation model and the wire-tap channel model, achieve security by utilizing channel reciprocity entropy and noise entropy, respectively.
Chen An +4 more
doaj +1 more source
International Liability in Cyberspace [PDF]
Activities in cyberspace often expose companies to cybertorts , a species of tort particularly difficult to reconcile with standard insurance policies.
Crane, Matthew
core +1 more source
Industrial control systems (ICSs), which are fundamental to the operation of critical infrastructure, face increasingly sophisticated security threats due to the integration of information and operational technologies.
Yunkai Song +3 more
doaj +1 more source
Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H. +2 more
core +1 more source
An Mcformer encoder integrating Mamba and Cgmlp for improved acoustic feature extraction
Currently, attention models based on the Conformer architecture have become mainstream in the field of speech recognition due to their integration of self-attention mechanisms and convolutional networks.
Nurmemet Yolwas +6 more
doaj +1 more source
Finding Impossible Differentials in ARX Ciphers under Weak Keys
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling +6 more
doaj +1 more source
Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core +1 more source
Introduction to cyberspace security discipline
With rapidly development of electronic information technology and industry, human society comes into information age. In the information age human lives and works in cyberspace. There for, it is the base requirement for human to ensure cyberspace security in the information age.
Huanguo ZHANG, Ruiying DU
openaire +3 more sources

