Results 51 to 60 of about 4,199 (192)
Cyberterrorism in Africa – Is This the Real Life, Is This Just Fantasy?
This paper seeks to examine the relevance of the term ‘cyberterrorism’ within African spaces. Although the notion of cyberterrorism as a concept is contested by scholars such as Jason Burke and Marc Sageman, the application of the concept in an African ...
Alta Grobbelaar
doaj +1 more source
Building an ontology for cyberterrorism [PDF]
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining
Grobler, Martha.M.M. +2 more
core
Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization [PDF]
This is the introduction to issue 1 of volume 40 of Studies in Conflict & Terrorism, which was a special issue focused on terrorist online propaganda and ...
Aly, Anne +3 more
core +1 more source
CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley +1 more source
Winning the battle with cyber risk identification tools in industrial control systems: A review
The work presents a review covering cyber risk identification tools in industrial control system. The work further explores the capabilities of these tools, identifies gaps and highlights open issues that need further attention in order to identify cyber risk early in time before attackers can try hitting the systems.
Ayo Rotibi, Neetesh Saxena, Pete Burnap
wiley +1 more source
Review article: The nature of terror medicine
Unique and Severe Injuries (Explosion Icon). Rapid Triage and Scene Safety (Clock Icon). Psychological Effects (Brain/Heart Icon). Broader Public Health Implications (Globe/Community Icon). Ethical and Legal Challenges (Scales/Legal Document Icon). This graphical abstract connects the central theme of the topic to the key points.
George Braitberg
wiley +1 more source
Analysis of modern types of cyberterrorism and methods of countering them
In light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats ...
Kakimzhan Bishmanov +3 more
doaj +1 more source
Toward an immunological turn in nineteenth‐century studies
Abstract This essay surveys the evolution of scholarship that embodies what (Anderson and Mackay [2014], Intolerant bodies: A short history of autoimmunity. Johns Hopkins University Press) have called the “immunological turn,” an interdisciplinary critical movement that takes immunity and vaccination as its primary critical objects.
Travis Chi Wing Lau
wiley +1 more source
Reality bytes: cyberterrorism and terrorist 'use' of the Internet [PDF]
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other.
Conway, Maura
core
Cyberspace, Cybercrime, Cyberterrorism [PDF]
AbstractThe purpose of this chapter is to synthetically characterize the phenomenon of cybercrime, cyberterrorism and cyberwar. It presents attempts to define computer crimes and their classification, history of criminalization of this phenomenon together with related difficulties.
openaire +1 more source

