Journal articles on the topic 'Cyber defensive'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber defensive.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Huntley, Wade, and Timothy Shives. "The Offense-Defense Balance in Cyberspace." European Conference on Cyber Warfare and Security 23, no. 1 (June 27, 2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Full textGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Full textSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber." Journal of Advanced Military Studies 12, no. 1 (April 30, 2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Full textDuvenage, Petrus, Wilhelm Bernhardt, and Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Full textPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Full textAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, and Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams." Electronics 11, no. 10 (May 14, 2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Full textAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan, and Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities." Mehran University Research Journal of Engineering and Technology 37, no. 2 (April 1, 2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Full textSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment." International Security 41, no. 3 (January 2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Full textArmstrong, Miriam E., Keith S. Jones, and Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Full textMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law." International Journal of Cyber Warfare and Terrorism 8, no. 1 (January 2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Full textHuskaj, Gazmend. "Offensive Cyberspace Operations for Cyber Security." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 476–79. http://dx.doi.org/10.34190/iccws.18.1.1054.
Full textKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems." International Journal of Engineering and Applied Computer Science 02, no. 01 (January 25, 2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Full textUsman, S. D., S. B. Junaidu, A. A. Obiniyi, and M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward." Scientia Africana 20, no. 3 (January 26, 2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Full textZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance." Surveillance & Society 16, no. 1 (April 1, 2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Full textJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott, and Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Full textLegg, Phil, Alan Mills, and Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (March 8, 2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Full textByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson, and Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations." Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Full textKullman, Kaur, Matt Ryan, and Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations." IFAC-PapersOnLine 52, no. 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Full textRaska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change." SIRIUS – Zeitschrift für Strategische Analysen 4, no. 2 (May 26, 2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.
Full textCarroll, Jami. "Agile Methods For Improved Cyber Operations Planning." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 108–15. http://dx.doi.org/10.34190/eccws.22.1.1138.
Full textWu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (September 5, 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Full textPoornima, B. "Cyber Preparedness of the Indian Armed Forces." Journal of Asian Security and International Affairs 10, no. 3 (November 28, 2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Full textFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries." INFORMATION AND LAW, no. 1(48) (March 6, 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Full textMerlino, Jorge C., Mohammed Asiri, and Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids." Sustainability 14, no. 5 (February 25, 2022): 2730. http://dx.doi.org/10.3390/su14052730.
Full textSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine." Analytical papers of the Institute of Europe RAS, no. 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Full textKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Full textWu, Zhijun, Ruochen Dong, and Peng Wang. "Research on Game Theory of Air Traffic Management Cyber Physical System Security." Aerospace 9, no. 8 (July 23, 2022): 397. http://dx.doi.org/10.3390/aerospace9080397.
Full textSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES." Cybersecurity & Cybercrime 1, no. 2 (March 2, 2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Full textThenjiwe Sithole, Jaco Du Toit, and Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Full textMerz, Terry, and Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Full textS, Mrs Yamuna. "Cloud Computing Based Cyber Defensive with Redundancy and Intruder Detection." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (March 31, 2019): 1810–15. http://dx.doi.org/10.22214/ijraset.2019.3336.
Full textWagner, Neal, Cem Ş. Şahin, Michael Winterrose, James Riordan, Diana Hanson, Jaime Peña, and William W. Streilein. "Quantifying the mission impact of network-level cyber defensive mitigations." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 14, no. 3 (August 17, 2016): 201–16. http://dx.doi.org/10.1177/1548512916662924.
Full textKaruna, Prakruthi, Hemant Purohit, Rajesh Ganesan, and Sushil Jajodia. "Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception." IEEE Intelligent Systems 33, no. 5 (September 1, 2018): 16–25. http://dx.doi.org/10.1109/mis.2018.2877277.
Full textLiu, Ning, Qing-Wei Chai, Shangkun Liu, Fanying Meng, and Wei-Min Zheng. "Mixed Strategy Analysis in Attack-Defense Game Model Based on 5G Heterogeneous Network of CPS Using ncPSO." Security and Communication Networks 2022 (November 7, 2022): 1–15. http://dx.doi.org/10.1155/2022/1181398.
Full textGrant, Tim. "Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?" European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 214–22. http://dx.doi.org/10.34190/eccws.22.1.1089.
Full textMangel, Marc, and Jimmie McEver. "Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid." Complexity 2021 (September 6, 2021): 1–19. http://dx.doi.org/10.1155/2021/5584123.
Full textGanguli, Chirag, Shishir Kumar Shandilya, Maryna Nehrey, and Myroslav Havryliuk. "Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense." Systems 11, no. 1 (January 5, 2023): 27. http://dx.doi.org/10.3390/systems11010027.
Full textEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, and Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure." Journal of Cybersecurity and Privacy 4, no. 2 (June 9, 2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Full textYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 22, 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Full textCzosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (January 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Full textIlić, Maja. "Cyber security during covid-19 pandemic." Savremene studije bezbednosti, no. 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Full textSarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Full textZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting." Applied and Computational Engineering 38, no. 1 (January 22, 2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Full textSzyłkowska, Monika. "Attributes of cyber conflict in the context of armed conflict – an outline of the problem." Przegląd Nauk o Obronności, no. 11 (April 14, 2022): 134–54. http://dx.doi.org/10.37055/pno/148424.
Full textMaennel, Kaie, Agnė Brilingaitė, Linas Bukauskas, Aušrius Juozapavičius, Benjamin James Knox, Ricardo Gregorio Lugo, Olaf Maennel, Ginta Majore, and Stefan Sütterlin. "A Multidimensional Cyber Defense Exercise: Emphasis on Emotional, Social, and Cognitive Aspects." SAGE Open 13, no. 1 (January 2023): 215824402311563. http://dx.doi.org/10.1177/21582440231156367.
Full textMcCune, Jayson, and Dwight A. Haworth. "Securing America Against Cyber War." International Journal of Cyber Warfare and Terrorism 2, no. 1 (January 2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Full textGENÇOĞLU, Muharrem Tuncay. "Mathematical Modeling of Cyber Attack and Defense." Bilgisayar Bilimleri ve Teknolojileri Dergisi 3, no. 1 (August 1, 2022): 10–16. http://dx.doi.org/10.54047/bibted.997908.
Full textJain, Jay Kumar, and Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 32 (February 24, 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Full textChu, Xiaodong, Yu Yi, Maosen Tang, Haoyi Huang, and Lei Zhang. "Defensive resource allocation for cyber-physical systems in global energy interconnection." IOP Conference Series: Earth and Environmental Science 227 (March 2, 2019): 042002. http://dx.doi.org/10.1088/1755-1315/227/4/042002.
Full textTrent, LTC Stoney, Robert Hoffman, Tony Leota, CPT Robert Frost, and MAJ Danielle Gonzalez. "Cyberspace Operations and the People Who Perform Them." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 216–17. http://dx.doi.org/10.1177/1541931213601048.
Full text