Developing Digital Competences. Work learn trajectories in Italian School System [PDF]
The work based learning is the core European dispositions on educational and training issue and a pillar of the Europe 2020 strategy (EUCOM 2009/C119/02).
LO PRESTI, Veronica
core
Introduction to the CyberWarfare: Offensive and Defensive Software Technologies Minitrack [PDF]
Brian Hay, Steven LaFountain
openalex +1 more source
Cybersecurity: mapping the ethical terrain [PDF]
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau +5 more
core
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources
MILITARY INFORMATION TECHNOLOGY, INFORMATION WARFARE AND CYBERWARFARE
Vaibhav Talekar +3 more
openalex +1 more source
Towards Reversible Cyberattacks [PDF]
This paper appeared in the Proceedings of the 9th European Conference on Information Warfare and Security, July 2010, Thessaloniki, Greece.Warfare without damage has always been a dream of military planners. Traditional warfare usually leaves persistent
Rowe, Neil C.
core
Constraining Attacker Capabilities Through Actuator Saturation
For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the ...
cardenas +6 more
core +1 more source
Contemporary cyber threats on the example of the phenomenon of cyberwarfare. A theoretical analysis [PDF]
Marek Górka
openalex +1 more source
The Generatıonal Dıvısıon of Warfare and Controversıal Issues
Purpose. To identify the transformational trends and controversial points of the changing face of military violence in the context of the concept of “Generations of warfare”. Method.
Zafar Nuri Najafov
doaj +1 more source
Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts [PDF]
This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The honeypots were located on the same /24 IPv4 network and configured as identically as possible.
Rabadia, Priya N, Valli, Craig
core +1 more source

