Results 11 to 20 of about 4,917 (184)

An NLP-Based Framework to Spot Extremist Networks in Social Media

open access: yesComplexity
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare.
Andrés Zapata Rozo   +4 more
doaj   +2 more sources

The Impact of Cyberwarfare on the National Security [PDF]

open access: yesFuture Human Image, 2023
Cyberwarfare has emerged as a critical threat to national security, encompassing attacks on critical infrastructure, government operations, and military capabilities.
Temur Digmelashvili
doaj   +1 more source

Cyberspace: A Digital Ecosystem

open access: yesSystems, 2021
Cyberspace is a new frontier, not just for hackers, but for engineers. It is a digital ecosystem, the next generation of Internet and network applications, promising a whole new world of distributed and open systems that can interact, self-organize ...
Kari J. Lippert, Robert Cloutier
doaj   +1 more source

Complexity Science and Cyber Operations: A Literature Survey

open access: yesComplex System Modeling and Simulation, 2023
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual elements.
Briant Becote, Bhaskar Prasad Rimal
doaj   +1 more source

Operation Framework Including Cyber Warfare Execution Process and Operational Concepts

open access: yesIEEE Access, 2020
Cyberspace has expanded due to the rapid spread of the Internet. This expansion of cyberspace has resulted in a change in war patterns from conventional warfare to cyberwarfare.
Sungjoong Kim   +4 more
doaj   +1 more source

A Review of: “Bitskrieg: The New Challenge of Cyberwarfare” by John Arquilla

open access: yesJournal of Central and Eastern European African Studies, 2023
Arquilla, John, Bitskrieg: The New Challenge of Cyberwarfare. Polity Press, Medford-Cambridge, 2021. ISBN-13: 978-1-5095-4362-5 (hc); ISBN-13: 978-1-5095-4363-2 (pb).
Attila Gulyás
doaj   +1 more source

Jus Contra Bellum in Cyberspace and the Sound of Silence

open access: yesOslo Law Review, 2022
This article explores the (in)activity of many States in contributing to the interpretative clarification of ‘how’ jus contra bellum applies in cyberspace, its negative repercussions for the work of the United Nations Group of Governmental Experts on ...
Johann Ruben Leiss
doaj   +1 more source

A Study on Cyber Target Importance Quantification and Ranking Algorithm

open access: yesApplied Sciences, 2022
Most of the challenges and conflicts facing countries and groups today involve cyberspace. Therefore, military forces around the world are developing methods (doctrines) and weapon systems to conduct cyberspace operations in order to dominate cyberspace.
Kookjin Kim   +5 more
doaj   +1 more source

Cyberwarfare

open access: yesIEEE Security & Privacy Magazine, 2011
Published in: IEEE Security & Privacy ( Volume: 9, Issue: 5, Sept.-Oct. 2011 ) The article of record as published may be found at http://dx.doi.org/10.1109/MSP.2011.132 This special issue on cyberwarfare concerns the use of cyberattacks as an instrument of warfare.
Berson, Thomas A., Denning, Dorothy E.
openaire   +3 more sources

A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks

open access: yesSensors, 2023
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj   +1 more source

Home - About - Disclaimer - Privacy