Results 141 to 150 of about 4,917 (184)
International Humanitarian Law on Cyberwarfare and Pakistan's Legal Framework
Sahar Haroon
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023
With today's changes in war doctrines, the areas where war is undertaken are highly diversified, in addition to the traditional land, air and, sea classifications. One of these areas is cyberspace, where all the activities are waged in this field by exploiting the advantages such as accessibility, availability, cheapness, convenience, anonymity ...
Caner Asbaş, Şule Erdem Tuzlukaya
openaire +1 more source
With today's changes in war doctrines, the areas where war is undertaken are highly diversified, in addition to the traditional land, air and, sea classifications. One of these areas is cyberspace, where all the activities are waged in this field by exploiting the advantages such as accessibility, availability, cheapness, convenience, anonymity ...
Caner Asbaş, Şule Erdem Tuzlukaya
openaire +1 more source
IEEE Security & Privacy Magazine, 2011
The principles of kinetic warfare are well documented, but are not always applicable to cyberwarfare. Differences between cyberspace and the real world suggest some additional principles. This article proposes some principles of cyberwarfare. This is not intended to be a comprehensive list but rather suggestions leading toward discussion and dialogue.
Raymond C. Parks, David P. Duggan
openaire +1 more source
The principles of kinetic warfare are well documented, but are not always applicable to cyberwarfare. Differences between cyberspace and the real world suggest some additional principles. This article proposes some principles of cyberwarfare. This is not intended to be a comprehensive list but rather suggestions leading toward discussion and dialogue.
Raymond C. Parks, David P. Duggan
openaire +1 more source
International Journal of Web and Grid Services, 2012
Today the computer networks of numerous organisations in critical digital infrastructure industries, as well as those of the militaries and governments around the world, are under constant cyberattacks. Many nation states are now preparing for cyberwarfare. However, it is not even clear what cyberwarfare is, as the term is used in the news media.
openaire +1 more source
Today the computer networks of numerous organisations in critical digital infrastructure industries, as well as those of the militaries and governments around the world, are under constant cyberattacks. Many nation states are now preparing for cyberwarfare. However, it is not even clear what cyberwarfare is, as the term is used in the news media.
openaire +1 more source
Cyberwarfare and Digital Governance
IEEE Internet Computing, 2017Dyn suffered multiple complex DDoS attacks in October 2016, constituting one of the largest cyberattacks of this nature ever documented. With this and other recent events in mind, the authors discuss conceptual and practical challenges around cyberwarfare and its impact on cyberspace governance.
Virgilio A.F. Almeida +2 more
openaire +1 more source
Abstract The African battlespace is evolving rapidly due to socio-economic factors, creating a complex and volatile environment for armed forces. Technological advancements are driving digital modernization, increasing the risk of multi-dimensional attacks and asymmetric warfare.
Jabu Mtsweni, Mphahlela Thaba
openaire +1 more source
Jabu Mtsweni, Mphahlela Thaba
openaire +1 more source
Economic Inquiry
Abstract This paper develops a theoretical model of cyberwarfare between nations, focusing on the factors that determine the severity and outcomes of cyber conflicts. We introduce a two‐country model where nations invest in offensive or defensive cyber capabilities across networked systems.
Erik Lillethun, Rishi Sharma
openaire +1 more source
Abstract This paper develops a theoretical model of cyberwarfare between nations, focusing on the factors that determine the severity and outcomes of cyber conflicts. We introduce a two‐country model where nations invest in offensive or defensive cyber capabilities across networked systems.
Erik Lillethun, Rishi Sharma
openaire +1 more source

