Results 41 to 50 of about 4,917 (184)
The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth [PDF]
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order.
Clark David D. +8 more
core +1 more source
ABSTRACT For over 30 years, the northern Mexican state of Chihuahua bordering Texas and New Mexico has experienced and witnessed multiple forms of violence across its rural and urban regions. Communities are besieged with cartel and gender‐based violence and the saturation of international corporations that pay less than livable wages for workers in ...
Sylvia Fernández Quintanilla +1 more
wiley +1 more source
CYBERSECURITY IN CENTRAL EASTERN EUROPE: FROM IDENTIFYING RISKS TO COUNTERING THREATS
Today, ensuring security in cyberspace is a top priority of national security policy for most states. States’ approaches to cybersecurity can be divided into two categories: those that regard cybersecurity as a civilian task; and those that involve their
Agnija Tumkevič
doaj +1 more source
Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers
It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact that current 5G communication systems are incapable of fully ensuring the required quality of service and the security of transmitted ...
Roman Odarchenko +4 more
doaj +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source
Just cyber war?: Casus belli, information ethics, and the human perspective [PDF]
Does the advent of cyber-war require us to abandon the traditional ethical framework for thinking about the morality of warfare - just war theory - and develop principles specific to the unique nature of cyber-attacks?
Arquilla +11 more
core +1 more source
Detection of replay attacks in CPSs using observer-based signature compensation [PDF]
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Puig Cayuela, Vicenç +3 more
core +1 more source
The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core +1 more source
The evolving landscape of military geoscience demands the integration of advanced geospatial technologies to enhance situational awareness, decision‐making and operational efficiency in military operations. This article focuses on the critical role of geographical information systems, remote sensing, artificial intelligence and drones in modern warfare,
Ivan Henrico
wiley +1 more source
The criminalization of aggression, which is diametrically opposed to the notion of state sovereignty, has remained in a state of suspended animation until recently. Effective starting on July 17, 2018, the International Criminal Court has been empowered
Karan Godara
doaj +1 more source

