Results 61 to 70 of about 5,305 (181)

Organised Cybercrime Trends in Times of War: The Hidden Frontline of the Russia-Ukraine Conflict

open access: yesStudies in Logic, Grammar and Rhetoric
The article examines current trends in organized cybercrime in the context of the Russian-Ukrainian war, with an emphasis on information operations and their underestimated danger in Europe.
Krzywkowska Justyna Magdalena   +1 more
doaj   +1 more source

The Legal Status of ‘Civilian Hackers’ under International Humanitarian Law

open access: yesActa Universitatis Lodziensis Folia Iuridica
In response to the rising trend of civilian hackers participating in cyber conflicts, the International Committee of the Red Cross has recently issued guidelines regulating their conduct.
Michał Byczyński
doaj   +1 more source

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Vom Dämonischen. Zur politischen Medientheorie des Daniel Suarez

open access: yesMedienimpulse, 2017
Die Romane des Programmierers Daniel Suarez sind weit mehr als reine Fiktionen. Seine terminatorischen Inszenierungen des Endkampfs zwischen Maschinen und Menschen basieren auf äußerst realen Studien zu derzeitigen (Kriegs-)Technologien, die als ...
Alessandro Barberi
doaj   +1 more source

Reality Winners

open access: yes
Critical Quarterly, Volume 67, Issue 4, Page 153-195, December 2025.
Lee Grieveson
wiley   +1 more source

New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation

open access: yesJournal of Political Science: Bulletin of Yerevan University
The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article
Anna Sisoyan
doaj   +1 more source

The legal regulation of military aspects of international information security.

open access: yesТеорія і практика правознавства, 2016
Article is devoted to the views of the content of the legal regulation of military aspects of international information security. Analysis of conceptual approaches to international legal regulation of information and communication technologies for ...
І. М. Забара
doaj   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Turing's three philosophical lessons and the philosophy of information [PDF]

open access: yes, 2012
In this article, I outline the three main philosophical lessons that we may learn from Turing's work, and how they lead to a new philosophy of information.
Floridi L.   +4 more
core   +2 more sources

Key exchange with the help of a public ledger

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy