Results 21 to 30 of about 4,917 (184)
Present and Future of Network Security Monitoring
Network Security Monitoring (NSM) is a popular term to refer to the detection of security incidents by monitoring the network events. An NSM system is central for the security of current networks, given the escalation in sophistication of cyberwarfare ...
Marta Fuentes-Garcia +2 more
doaj +1 more source
Hybrid warfare and disinformation: A Ukraine war perspective
Abstract Misinformation, disinformation and mal information are part of the information disorder construct, dominating the information warfare domain. These are key enablers associated with grey zone operations, and an integral part of current adversaries' and competitors' hybrid warfare tool kit.
Sascha‐Dominik Dov Bachmann +2 more
wiley +1 more source
Warfighting for cyber deterrence: a strategic and moral imperative [PDF]
Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War ...
Lonsdale, David J.
core +1 more source
FROM CYBER WARFARE TO CYBER PEACE [PDF]
In current peace and security issues, a paradigm shift has occurred in the sense that the role of technological and scientific progress has increased explosively, especially the rapid development of information technology (IT) and artificial ...
Gheorghe BOARU
doaj +1 more source
Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss +15 more
core +2 more sources
Cybersecurity, cyberwarfare, information wars, cyber defense, cyberspace - concepts that have recently increasingly filled the space around everyone. More and more often we hear these words, more and more often they play an important role.
Viktor Bondarenko
doaj +1 more source
US Global Ambitions in Digital Age
The article investigates the political problem of U.S. domination in global cyberspace. The author deals with historical questions of U.S. Cybercommand build up and military strategies of cyberwarfare applications.
E. Rogovskii
doaj +1 more source
ICSTASY: An Integrated Cybersecurity Training System for Military Personnel
Cyberwarfare can occur at any moment, anywhere on the planet, and it happens more often than we realize. The new form of warfare is wreaking havoc on not only the military but also on every aspect of our daily lives. Since cybersecurity has only recently
Donghwan Lee +4 more
doaj +1 more source
Kurban О. V. Modern Cyberwarfare: Textbook. Contents Index
The publication is dedicated to the new textbook that was published in 2016 of modern researcher of information space and pedagogue of higher school, Candidate of Sciences in Social Communications O. V. Kurban.
Sofia Kurban
doaj +1 more source
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks.
Javier Blesa +9 more
doaj +1 more source

