Results 11 to 20 of about 4,917 (184)
An NLP-Based Framework to Spot Extremist Networks in Social Media
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare.
Andrés Zapata Rozo +4 more
doaj +2 more sources
The Impact of Cyberwarfare on the National Security [PDF]
Cyberwarfare has emerged as a critical threat to national security, encompassing attacks on critical infrastructure, government operations, and military capabilities.
Temur Digmelashvili
doaj +1 more source
Cyberspace: A Digital Ecosystem
Cyberspace is a new frontier, not just for hackers, but for engineers. It is a digital ecosystem, the next generation of Internet and network applications, promising a whole new world of distributed and open systems that can interact, self-organize ...
Kari J. Lippert, Robert Cloutier
doaj +1 more source
Complexity Science and Cyber Operations: A Literature Survey
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual elements.
Briant Becote, Bhaskar Prasad Rimal
doaj +1 more source
Operation Framework Including Cyber Warfare Execution Process and Operational Concepts
Cyberspace has expanded due to the rapid spread of the Internet. This expansion of cyberspace has resulted in a change in war patterns from conventional warfare to cyberwarfare.
Sungjoong Kim +4 more
doaj +1 more source
A Review of: “Bitskrieg: The New Challenge of Cyberwarfare” by John Arquilla
Arquilla, John, Bitskrieg: The New Challenge of Cyberwarfare. Polity Press, Medford-Cambridge, 2021. ISBN-13: 978-1-5095-4362-5 (hc); ISBN-13: 978-1-5095-4363-2 (pb).
Attila Gulyás
doaj +1 more source
Jus Contra Bellum in Cyberspace and the Sound of Silence
This article explores the (in)activity of many States in contributing to the interpretative clarification of ‘how’ jus contra bellum applies in cyberspace, its negative repercussions for the work of the United Nations Group of Governmental Experts on ...
Johann Ruben Leiss
doaj +1 more source
A Study on Cyber Target Importance Quantification and Ranking Algorithm
Most of the challenges and conflicts facing countries and groups today involve cyberspace. Therefore, military forces around the world are developing methods (doctrines) and weapon systems to conduct cyberspace operations in order to dominate cyberspace.
Kookjin Kim +5 more
doaj +1 more source
Published in: IEEE Security & Privacy ( Volume: 9, Issue: 5, Sept.-Oct. 2011 ) The article of record as published may be found at http://dx.doi.org/10.1109/MSP.2011.132 This special issue on cyberwarfare concerns the use of cyberattacks as an instrument of warfare.
Berson, Thomas A., Denning, Dorothy E.
openaire +3 more sources
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj +1 more source

