Results 61 to 70 of about 5,305 (181)
Organised Cybercrime Trends in Times of War: The Hidden Frontline of the Russia-Ukraine Conflict
The article examines current trends in organized cybercrime in the context of the Russian-Ukrainian war, with an emphasis on information operations and their underestimated danger in Europe.
Krzywkowska Justyna Magdalena +1 more
doaj +1 more source
The Legal Status of ‘Civilian Hackers’ under International Humanitarian Law
In response to the rising trend of civilian hackers participating in cyber conflicts, the International Committee of the Red Cross has recently issued guidelines regulating their conduct.
Michał Byczyński
doaj +1 more source
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa +2 more
core +1 more source
Vom Dämonischen. Zur politischen Medientheorie des Daniel Suarez
Die Romane des Programmierers Daniel Suarez sind weit mehr als reine Fiktionen. Seine terminatorischen Inszenierungen des Endkampfs zwischen Maschinen und Menschen basieren auf äußerst realen Studien zu derzeitigen (Kriegs-)Technologien, die als ...
Alessandro Barberi
doaj +1 more source
Critical Quarterly, Volume 67, Issue 4, Page 153-195, December 2025.
Lee Grieveson
wiley +1 more source
The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article
Anna Sisoyan
doaj +1 more source
The legal regulation of military aspects of international information security.
Article is devoted to the views of the content of the legal regulation of military aspects of international information security. Analysis of conceptual approaches to international legal regulation of information and communication technologies for ...
І. М. Забара
doaj +1 more source
Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core +1 more source
Turing's three philosophical lessons and the philosophy of information [PDF]
In this article, I outline the three main philosophical lessons that we may learn from Turing's work, and how they lead to a new philosophy of information.
Floridi L. +4 more
core +2 more sources
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source

