Zeitschriftenartikel zum Thema „Cybernetic attacks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cybernetic attacks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile und Nurettin Erginoz. „Massive Cyber-Attacks Patterns Implemented with BDI Agents“. Applied Mechanics and Materials 811 (November 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.
Der volle Inhalt der QuelleMoga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu und Ramona Lile. „Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures“. Applied Mechanics and Materials 841 (Juni 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.
Der volle Inhalt der QuelleKubanov, E. V. „Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration“. Public administration aspects 6, Nr. 8 (10.09.2018): 49–55. http://dx.doi.org/10.15421/151846.
Der volle Inhalt der QuelleDudek, Wojciech, und Wojciech Szynkiewicz. „Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety“. Journal of Telecommunications and Information Technology 2 (28.06.2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.
Der volle Inhalt der QuelleAkhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova und Sh Sagyndykova. „Decision support system for assessing the consequences of cyber attacks“. Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, Nr. 1 (15.03.2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.
Der volle Inhalt der QuelleOsak, Alexey, Daniil Panasetsky und Elena Buzina. „Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization“. E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.
Der volle Inhalt der QuelleLaktionov, Illia, Andrii Kmit, Ivan Opirskyy und Oleh Harasymchuk. „RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR“. Cybersecurity: Education, Science, Technique 1, Nr. 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.
Der volle Inhalt der QuelleShukla, Prashant Kumar. „An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things“. International Journal of Wireless and Ad Hoc Communication 7, Nr. 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.
Der volle Inhalt der QuelleYuyukin, I. V. „Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness“. Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, Nr. 3 (30.07.2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.
Der volle Inhalt der QuelleDhirani, Lubna Luxmi, und Thomas Newe. „Securing industry 5.0 using 6σ CYBERNETIC framework“. Mehran University Research Journal of Engineering and Technology 43, Nr. 2 (07.04.2024): 220. http://dx.doi.org/10.22581/muet1982.3202.
Der volle Inhalt der QuelleToctaquiza, Juan, Diego Carrión und Manuel Jaramillo. „An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks“. Energies 16, Nr. 6 (21.03.2023): 2879. http://dx.doi.org/10.3390/en16062879.
Der volle Inhalt der Quellede Brito, Israel Barbosa, und Rafael T. de Sousa. „Development of an Open-Source Testbed Based on the Modbus Protocol for Cybersecurity Analysis of Nuclear Power Plants“. Applied Sciences 12, Nr. 15 (08.08.2022): 7942. http://dx.doi.org/10.3390/app12157942.
Der volle Inhalt der QuelleLeszczuk, Sylwia. „Cyber conflict in the light of article 5 of the North Atlantic treaty“. Історико-політичні проблеми сучасного світу, Nr. 39 (16.06.2019): 12–20. http://dx.doi.org/10.31861/mhpi2019.39.12-20.
Der volle Inhalt der QuelleKybich, Yana. „Peculiarities of the cybersecurity of Ukraine formation in the conditions of hybrid war“. Mediaforum : Analytics, Forecasts, Information Management, Nr. 6 (17.12.2018): 94–111. http://dx.doi.org/10.31861/mediaforum.2018.6.94-111.
Der volle Inhalt der QuelleMarkov, A., und N. Romashkina. „The Problem of Identifying the Source (Atribution) of Cyberattacks – An International Security Factor“. World Economy and International Relations 66, Nr. 12 (2022): 58–68. http://dx.doi.org/10.20542/0131-2227-2022-66-12-58-68.
Der volle Inhalt der QuelleSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny und Zuzanna Górecka. „Controller Cyber-Attack Detection and Isolation“. Sensors 23, Nr. 5 (03.03.2023): 2778. http://dx.doi.org/10.3390/s23052778.
Der volle Inhalt der QuelleShuklin, German, und Oleg Barabash. „Model of cybernetic attacks intensity calculation in the electronic trading system on the stock market“. Advanced Information Systems 2, Nr. 3 (28.11.2018): 111–14. http://dx.doi.org/10.20998/2522-9052.2018.3.19.
Der volle Inhalt der QuelleSunhurova, S. R. „TYPES OF CYBERNETIC ATTACKS OF THE RUSSIAN FEDERATION AND THEIR SOCIO-POLITICAL CONSEQUENCES FOR UKRAINE“. Scientific Journal "Regional Studies", Nr. 28 (2022): 88–91. http://dx.doi.org/10.32782/2663-6170/2022.28.16.
Der volle Inhalt der QuelleMacana, Carlos, Ahmed Abdou, Hemanshu Pota, Josep Guerrero und Juan Vasquez. „Cyber Physical Energy Systems Modules for Power Sharing Controllers in Inverter Based Microgrids“. Inventions 3, Nr. 3 (11.09.2018): 66. http://dx.doi.org/10.3390/inventions3030066.
Der volle Inhalt der QuelleOsak, Alexey, Daniil Panasetsky und Elena Buzina. „Analysis of the emergency control and relay protection structures approached from the point of view of EPS reliability and survivability by taking into account cybersecurity threats“. E3S Web of Conferences 139 (2019): 01029. http://dx.doi.org/10.1051/e3sconf/201913901029.
Der volle Inhalt der QuelleSallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan und Majdi Ben Saad. „Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework“. International Journal of Information Security and Privacy 5, Nr. 4 (Oktober 2011): 47–58. http://dx.doi.org/10.4018/jisp.2011100104.
Der volle Inhalt der QuelleMujević, Mersad. „SYNTHESIS OF THREATS AND RISKS OF CYBER SECURITY OF MONTENEGRO - THE VULNERABILITY ASPECT OF INFORMATION COMMUNICATION INFRASTRUCTURE“. SCIENCE International Journal 1, Nr. 1 (13.12.2022): 1–12. http://dx.doi.org/10.35120/sciencej010101m.
Der volle Inhalt der QuelleStankutė, Martyna. „Legal services today and in the future: how is changing the job of a lawyer?“ Vilnius University Open Series, Nr. 4 (16.11.2020): 248–73. http://dx.doi.org/10.15388/os.tmp.2020.12.
Der volle Inhalt der QuelleMoskovchenko, Valeriy, Mikhail Gudkov und Oleg Lauta. „Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks“. NBI Technologies, Nr. 2 (Februar 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Der volle Inhalt der QuelleKalinin, Maxim, Roman Demidov und Peter Zegzhda. „Hybrid Neural Network Model for Protection of Dynamic Cyber Infrastructure“. Nonlinear Phenomena in Complex Systems 22, Nr. 4 (10.12.2019): 375–82. http://dx.doi.org/10.33581/1561-4085-2019-22-4-375-382.
Der volle Inhalt der QuelleMinaev, V. A., I. D. Korolev und V. V. Mukhortov. „INTEGRATED ASSESSMENT OF STABILITY FUNCTIONING COMPLEX TECHNICAL SYSTEMS IN THE TECHNO AND INFO SPHERE“. Issues of radio electronics, Nr. 5 (20.05.2018): 89–94. http://dx.doi.org/10.21778/2218-5453-2018-5-89-94.
Der volle Inhalt der QuelleSubach, Ihor, und Vitalii Fesokha. „Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules“. Collection "Information technology and security" 5, Nr. 2 (31.12.2017): 145–52. http://dx.doi.org/10.20535/2411-1031.2017.5.2.136984.
Der volle Inhalt der QuelleNovikova, А. „SOCIO-POLITICAL PROCESS AND INFORMATION SECURITY OF TRANSBAIKALIA AS PROTECTION OF NATIONAL INTERESTS“. TRANSBAIKAL STATE UNIVERSITY JOURNAL 28, Nr. 5 (2022): 70–76. http://dx.doi.org/10.21209/2227-9245-2022-28-5-70-76.
Der volle Inhalt der QuelleHonório, Thiago Jacobino. „O uso de ciberataques em eleições e as Relações Internacionais | The use of cyberattacks in elections and International Relations“. Mural Internacional 9, Nr. 1 (30.06.2018): 85–98. http://dx.doi.org/10.12957/rmi.2018.32570.
Der volle Inhalt der QuelleRamos, Angélica, Elizabeth Torres Ramos, Abigail Alonso Reyes und Laura Segundo Gil. „Continuidad de negocio, análisis de la exposición al riesgo de ataques cibernéticos en empresas micro y pequeñas de la región Atlautla, Ozumba y Amecameca“. Revista Relayn - Micro y Pequeñas empresas en Latinoamérica 5, Nr. 2 (09.11.2021): 148–66. http://dx.doi.org/10.46990/relayn.2021.5.2.338.
Der volle Inhalt der QuelleBuriachok, Volodymyr L., Svitlana M. Shevchenko und Pavlo M. Skladannyi. „VIRTUAL LABORATORY FOR MODELING OF PROCESSES IN INFORMATIONAL AND CYBER SECURITIES AS A FORM OF FORMING PRACTICAL SKILLS OF STUDENTS“. Cybersecurity: Education, Science, Technique, Nr. 2 (2018): 98–104. http://dx.doi.org/10.28925/2663-4023.2018.2.98104.
Der volle Inhalt der QuelleRomashkina, N. P. „The International Legal Regime of Control over Cyber Weapons in the Future World Order: Threats and Prospects“. Diplomaticheskaja sluzhba (Diplomatic Service), Nr. 2 (31.03.2023): 150–61. http://dx.doi.org/10.33920/vne-01-2302-07.
Der volle Inhalt der QuelleZegzhda, Dmitry, Daria Lavrova, Evgeny Pavlenko und Anna Shtyrkina. „Cyber Attack Prevention Based on Evolutionary Cybernetics Approach“. Symmetry 12, Nr. 11 (23.11.2020): 1931. http://dx.doi.org/10.3390/sym12111931.
Der volle Inhalt der QuellePączkowski, Tomasz. „Cybernetic warfare – tips from Ukraine“. Res Politicae 15 (2023): 73–86. http://dx.doi.org/10.16926/rp.2023.15.04.
Der volle Inhalt der QuellePerwej, Dr Yusuf, Syed Qamar Abbas, Jai Pratap Dixit, Dr Nikhat Akhtar und Anurag Kumar Jaiswal. „A Systematic Literature Review on the Cyber Security“. International Journal of Scientific Research and Management 9, Nr. 12 (28.12.2021): 669–710. http://dx.doi.org/10.18535/ijsrm/v9i12.ec04.
Der volle Inhalt der QuelleKonnov, Vladimir. „The discursive practices of the research program of B. F. Lomov in promotion of Soviet engineering psychology“. Vestnik of Saint Petersburg University. Psychology 12, Nr. 1 (2022): 83–95. http://dx.doi.org/10.21638/spbu16.2022.107.
Der volle Inhalt der QuelleКорягина, Светлана Александровна. „Рrotecting confidential information in a university environment“. Management of Education, Nr. 4(44) (15.09.2021): 209–16. http://dx.doi.org/10.25726/f9834-2371-9486-f.
Der volle Inhalt der QuelleHashimoto, Wataru. „Autopoiesis, Observation and Informatics: Lessons from the Development of Autopoietic Systems Theory in Japan“. tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, Nr. 2 (30.10.2011): 414–23. http://dx.doi.org/10.31269/triplec.v9i2.294.
Der volle Inhalt der QuelleHashimoto, Wataru. „Autopoiesis, Observation and Informatics: Lessons from the Development of Autopoietic Systems Theory in Japan“. tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, Nr. 2 (30.10.2011): 414–23. http://dx.doi.org/10.31269/vol9iss2pp414-423.
Der volle Inhalt der QuelleASIMOPOLOS, Laurentiu A., Adrian-Aristide ASIMOPOLOS und Natalia-Silvia ASIMOPOLOS. „THE ROLE OF INTERDEPENDENCIES BETWEEN CRITICAL INFRASTRUCTURES IN RURAL DEVELOPMENT“. Annals of Spiru Haret University. Economic Series 18, Nr. 2 (29.06.2018): 63–81. http://dx.doi.org/10.26458/1823.
Der volle Inhalt der QuelleBardin, Andrea. „Simondon Contra New Materialism: Political Anthropology Reloaded“. Theory, Culture & Society 38, Nr. 5 (27.05.2021): 25–44. http://dx.doi.org/10.1177/02632764211012047.
Der volle Inhalt der QuelleMattiello, Elisa. „The Development of ESP Lexicon Through New Combining Forms“. International Journal of English Linguistics 13, Nr. 7 (20.12.2023): 5. http://dx.doi.org/10.5539/ijel.v13n7p5.
Der volle Inhalt der QuelleShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi und Svitlana Spasiteleva. „MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY“. Cybersecurity: Education, Science, Technique 1, Nr. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.
Der volle Inhalt der QuelleGriffin, Brandon, Keitavius Alexander, Xavier-Lewis Palmer und Lucas Potter. „Social-Engineering, Bio-economies, and Nation-State Ontological Security: A Commentary“. International Conference on Cyber Warfare and Security 18, Nr. 1 (28.02.2023): 111–18. http://dx.doi.org/10.34190/iccws.18.1.1021.
Der volle Inhalt der QuelleKubík, Josef, und Aleš Ruda. „Cyber security management model“. International Journal of Public Administration, Management and Economic Development 8, Nr. 2 (31.12.2023). http://dx.doi.org/10.60026/ijpamed.v8i2.140.
Der volle Inhalt der QuelleKotenko, Igor, und Alexander Ulanov. „AGENT-BASED SIMULATION OF DDOS ATTACKS AND DEFENSE MECHANISMS“. International Journal of Computing, 01.08.2014, 113–23. http://dx.doi.org/10.47839/ijc.4.2.343.
Der volle Inhalt der QuelleUngur-Brehoi, Carmen. „Romanian media and public's safety during information warfare“. International Journal of Legal and Social Order 3, Nr. 1 (01.12.2023). http://dx.doi.org/10.55516/ijlso.v3i1.134.
Der volle Inhalt der QuelleYASELSKA, NATALIA. „ACCESS TO JUSTICE DURING MARTIAL LAW“. Law. Human. Environment 13, Nr. 2 (07.04.2022). http://dx.doi.org/10.31548/law2022.02.010.
Der volle Inhalt der QuelleParikka, Jussi. „Viral Noise and the (Dis)Order of the Digital Culture“. M/C Journal 7, Nr. 6 (01.01.2005). http://dx.doi.org/10.5204/mcj.2472.
Der volle Inhalt der QuelleЫдырышбаева, М. Б. „МОДЕЛЬ ОПИСАНИЯ МЕТАЗНАНИЙ В СИСТЕМЕ ПОДДЕРЖКИ РЕШЕНИЙ ПО ОБЕСПЕЧЕНИЮ КИБЕРБЕЗОПАСНОСТИ“. BULLETIN Series Physical and Mathematical Sciences 81, Nr. 1(2023) (25.09.2023). http://dx.doi.org/10.51889/2959-5894.2023.81.1.021.
Der volle Inhalt der Quelle