Results 21 to 30 of about 4,917 (184)

Present and Future of Network Security Monitoring

open access: yesIEEE Access, 2021
Network Security Monitoring (NSM) is a popular term to refer to the detection of security incidents by monitoring the network events. An NSM system is central for the security of current networks, given the escalation in sophistication of cyberwarfare ...
Marta Fuentes-Garcia   +2 more
doaj   +1 more source

Hybrid warfare and disinformation: A Ukraine war perspective

open access: yesGlobal Policy, Volume 14, Issue 5, Page 858-869, November 2023., 2023
Abstract Misinformation, disinformation and mal information are part of the information disorder construct, dominating the information warfare domain. These are key enablers associated with grey zone operations, and an integral part of current adversaries' and competitors' hybrid warfare tool kit.
Sascha‐Dominik Dov Bachmann   +2 more
wiley   +1 more source

Warfighting for cyber deterrence: a strategic and moral imperative [PDF]

open access: yes, 2017
Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War ...
Lonsdale, David J.
core   +1 more source

FROM CYBER WARFARE TO CYBER PEACE [PDF]

open access: yesAnnals: Series on Military Sciences
In current peace and security issues, a paradigm shift has occurred in the sense that the role of technological and scientific progress has increased explosively, especially the rapid development of information technology (IT) and artificial ...
Gheorghe BOARU
doaj   +1 more source

Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]

open access: yes, 2019
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss   +15 more
core   +2 more sources

Cyber security: the role of the state in protecting society and individual personality in maintaining interethnic peace

open access: yesAspekti Publìčnogo Upravlìnnâ, 2020
Cybersecurity, cyberwarfare, information wars, cyber defense, cyberspace - concepts that have recently increasingly filled the space around everyone. More and more often we hear these words, more and more often they play an important role.
Viktor Bondarenko
doaj   +1 more source

US Global Ambitions in Digital Age

open access: yesМеждународная аналитика, 2015
The article investigates the political problem of U.S. domination in global cyberspace. The author deals with historical questions of U.S. Cybercommand build up and military strategies of cyberwarfare applications.
E. Rogovskii
doaj   +1 more source

ICSTASY: An Integrated Cybersecurity Training System for Military Personnel

open access: yesIEEE Access, 2022
Cyberwarfare can occur at any moment, anywhere on the planet, and it happens more often than we realize. The new form of warfare is wreaking havoc on not only the military but also on every aspect of our daily lives. Since cybersecurity has only recently
Donghwan Lee   +4 more
doaj   +1 more source

Kurban О. V. Modern Cyberwarfare: Textbook. Contents Index

open access: yesІнтегровані комунікації, 2016
The publication is dedicated to the new textbook that was published in 2016 of modern researcher of information space and pedagogue of higher school, Candidate of Sciences in Social Communications O. V. Kurban.
Sofia Kurban
doaj   +1 more source

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

open access: yesSensors, 2009
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks.
Javier Blesa   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy