Journal articles on the topic 'State cyberattacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'State cyberattacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Full textNizovtsev, Yuriy Yu, Andrii M. Lyseiuk, and Mykhailo Kelman. "From self-affirmation to national security threat." Revista Científica General José María Córdova 20, no. 38 (April 1, 2022): 355–70. http://dx.doi.org/10.21830/19006586.905.
Full textAnnef, Al Bahits. "ANCAMAN SIBER DI TENGAH PANDEMI COVID-19 : TINJAUAN TERHADAP KEAMANAN NON-TRADISIONAL DAN KEAMANAN SIBER DI INDONESIA." Sriwijaya Journal of International Relations 1, no. 1 (June 28, 2021): 18–33. http://dx.doi.org/10.47753/sjir.v1i1.3.
Full textKOLOSOK, Irina N., and Liudmila A. GURINA. "Identification of Cyberattacks on SCADA and WAMS Systems in Electric Power Systems when Processing Measurements by State Estimation Methods." Elektrichestvo 6, no. 6 (2021): 25–32. http://dx.doi.org/10.24160/0013-5380-2021-6-25-32.
Full textKhattak, Zulqarnain H., Hyungjun Park, Seongah Hong, Richard Atta Boateng, and Brian L. Smith. "Investigating Cybersecurity Issues in Active Traffic Management Systems." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (July 22, 2018): 79–90. http://dx.doi.org/10.1177/0361198118787636.
Full textGórka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (September 1, 2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.
Full textPołeć, Jolanta, and Wojciech Trzaskowski. "The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe." Przegląd Nauk o Obronności, no. 12 (June 20, 2022): 111–30. http://dx.doi.org/10.37055/pno/150838.
Full textHrushko, M. V. "ATTRIBUTION OF CYBERATTACKS AS A PREREQUISITE FOR ENSURING RESPONSIBLE BEHAVIOR IN CYBERSPACE." Constitutional State, no. 43 (October 26, 2021): 195–201. http://dx.doi.org/10.18524/2411-2054.2021.43.241002.
Full textAlsulami, Abdulaziz A., Qasem Abu Al-Haija, Ali Alqahtani, and Raed Alsini. "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model." Symmetry 14, no. 7 (July 15, 2022): 1450. http://dx.doi.org/10.3390/sym14071450.
Full textEichensehr, Kristen E. "Decentralized Cyberattack Attribution." AJIL Unbound 113 (2019): 213–17. http://dx.doi.org/10.1017/aju.2019.33.
Full textKnebel, Sebastian, Mario D. Schultz, and Peter Seele. "Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating." Journal of Information, Communication and Ethics in Society 20, no. 1 (October 11, 2021): 91–109. http://dx.doi.org/10.1108/jices-01-2021-0015.
Full textVasylenko, Serhii, Igor Samoilov, and Serhii Burian. "Method of control of the state of protection of the automated process control system of the critical infrastructure facility." Collection "Information Technology and Security" 10, no. 1 (June 30, 2022): 17–26. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261047.
Full textKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Full textSurilova, O. O. "PUBLIC ATTRIBUTION OF CYBERATACS BY EU MEMBER STATES AND THE APPLICATION OF CYBERSANCTIONS BY THE UNION TO CYBERATTACKS THREATENING THE UNION OR ITS MEMBER STATES." Constitutional State, no. 43 (October 26, 2021): 209–16. http://dx.doi.org/10.18524/2411-2054.2021.43.241005.
Full textVoronko, I. "DIFFERENTIAL-GAME MODEL OF INFORMATION PROTECTION FOR COMPUTER SYSTEMS OF TRANSPORT INFRASTRUCTURE." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 38 (December 24, 2021): 201–12. http://dx.doi.org/10.32703/2617-9040-2021-38-198-19.
Full textPoptchev, Peter. "NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.
Full textKolosok, Irina, and Liudmila Gurina. "A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis." E3S Web of Conferences 216 (2020): 01029. http://dx.doi.org/10.1051/e3sconf/202021601029.
Full textLYSENKO, SERGII, DMYTRO SOKALSKYI, and IIANA MYKHASKO. "METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART." Computer systems and information technologies, no. 3 (April 14, 2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.
Full textLukicheva, I. A., and A. L. Kulikov. "The usage of power system multi-model forecasting aided state estimation for cyber attack detection." Power engineering: research, equipment, technology 23, no. 5 (January 9, 2022): 13–23. http://dx.doi.org/10.30724/1998-9903-2021-23-5-13-23.
Full textKallberg, Jan, and Bhavani Thuraisingham. "State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks." IT Professional 15, no. 3 (May 2013): 32–35. http://dx.doi.org/10.1109/mitp.2013.20.
Full textMaltseva, Irina, Yuliya Chernish, and Roman Shtonda. "ANALYSIS OF SOME CYBER THREATS IN WAR." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 37–44. http://dx.doi.org/10.28925/2663-4023.2022.16.3744.
Full textSigholm, Johan. "Non-State Actors in Cyberspace Operations." Journal of Military Studies 4, no. 1 (December 1, 2013): 1–37. http://dx.doi.org/10.1515/jms-2016-0184.
Full textMokhor, Volodymyr, Oleksandr Korchenko, Serhii Honchar, Maxsim Komarov, and Alla Onyskova. "Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects." E3S Web of Conferences 280 (2021): 09009. http://dx.doi.org/10.1051/e3sconf/202128009009.
Full textТарасевич, Ксения Александровна. "Cyberattack as a Risk Factor During Formation of Business Reputation of a Commercial Legal Entity." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 2 (June 15, 2022): 87–92. http://dx.doi.org/10.26163/gief.2022.68.56.015.
Full textVega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, José-Luis Casteleiro-Roca, Esteban Jove, María del Carmen Meizoso-López, Benigno Antonio Rodríguez-Gómez, et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids." Applied Sciences 10, no. 7 (March 27, 2020): 2276. http://dx.doi.org/10.3390/app10072276.
Full textActon, James M. "Cyber Warfare & Inadvertent Escalation." Daedalus 149, no. 2 (April 2020): 133–49. http://dx.doi.org/10.1162/daed_a_01794.
Full textGonzález-Manzano, Lorena, José M. de Fuentes, Cristina Ramos, Ángel Sánchez, and Florabel Quispe. "Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model." Security and Communication Networks 2022 (June 29, 2022): 1–11. http://dx.doi.org/10.1155/2022/5784674.
Full textSoleymannejad, Mohammad, Danial Sadrian Zadeh, Behzad Moshiri, Ebrahim Navid Sadjadi, Jesús García Herrero, and Jose Manuel Molina López. "State Estimation Fusion for Linear Microgrids over an Unreliable Network." Energies 15, no. 6 (March 21, 2022): 2288. http://dx.doi.org/10.3390/en15062288.
Full textPérez-Morón, James. "Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda." Journal of Asia Business Studies 16, no. 2 (November 3, 2021): 371–95. http://dx.doi.org/10.1108/jabs-11-2020-0444.
Full textNikolaienko, Bohdan, and Serhii Vasylenko. "APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 4 (December 20, 2021): 9–13. http://dx.doi.org/10.35784/iapgos.2822.
Full textLobach, Dmitriy. "TO THE QUESTION OF POSSIBLE INTERNATIONAL LEGAL QUALIFICATION OF CYBER ATTACKS AS A CRIME OF AGGRESSION AND INTERNATIONAL TERRORISM." Advances in Law Studies 9, no. 4 (December 25, 2021): 46–50. http://dx.doi.org/10.29039/2409-5087-2021-9-4-46-50.
Full textToliupa, S., S. Buchyk, O. Buchyk, and O. Kulinich. "PROTECTION OF STATE MANAGEMENT OF CRITICAL INFRASTRUCTURE OBJECTS UNDER THE INFLUENCE OF CYBER ATTACKS." Information and communication technologies, electronic engineering 2, no. 2 (December 2022): 33–41. http://dx.doi.org/10.23939/ictee2022.02.033.
Full textAbuali, M. M., and M. Sh Junisbekov. "Current cybersecurity state of automated processes in the international Aktau seaport." Mechanics and Technologies, no. 3 (September 30, 2021): 58–62. http://dx.doi.org/10.55956/giwk9768.
Full textShin, Young, Jae Lee, and Myungchul Kim. "Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles." Journal of the Association for Information Systems 19, no. 3 (March 2018): 152–81. http://dx.doi.org/10.17705/1jais.00488.
Full textBoyte, Kenneth J. "A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine: Exemplifying the Evolution of Internet-Supported Warfare." International Journal of Cyber Warfare and Terrorism 7, no. 2 (April 2017): 54–69. http://dx.doi.org/10.4018/ijcwt.2017040104.
Full textLavrova, D. S. "Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 1023–25. http://dx.doi.org/10.3103/s0146411619080133.
Full textShterev, Yordan. "Concepts of Cyber Security." Innovative STEM Education 4, no. 1 (June 10, 2022): 79–88. http://dx.doi.org/10.55630/stem.2022.0411.
Full textDeng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Full textEfrony, Dan, and Yuval Shany. "A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice." American Journal of International Law 112, no. 4 (October 2018): 583–657. http://dx.doi.org/10.1017/ajil.2018.86.
Full textZhou, Buxiang, Yating Cai, Tianlei Zang, Jiale Wu, Binjie Sun, and Shi Chen. "Reliability Assessment of Cyber–Physical Distribution Systems Considering Cyber Disturbances." Applied Sciences 13, no. 6 (March 8, 2023): 3452. http://dx.doi.org/10.3390/app13063452.
Full textRiebe, Thea, Marc-André Kaufhold, and Christian Reuter. "The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–30. http://dx.doi.org/10.1145/3479865.
Full textSutikno, Tole, and Deris Stiawan. "Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector?" Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 2989–94. http://dx.doi.org/10.11591/eei.v11i6.4854.
Full textKalinin, Maxim, Dmitry Zegzhda, Vasiliy Krundyshev, Daria Lavrova, Dmitry Moskvin, and Evgeny Pavlenko. "Application of Bioinformatics Algorithms for 3RO\PRUSKLF Cyberattacks Detection." Informatics and Automation 20, no. 4 (August 3, 2021): 820–44. http://dx.doi.org/10.15622/ia.20.4.3.
Full textHallman, Roger A., Maxine Major, Jose Romero-Mariona, Richard Phipps, Esperanza Romero, Scott M. Slayback, Francisco Tacliad, and John M. San Miguel. "Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures." International Journal of Organizational and Collective Intelligence 11, no. 2 (April 2021): 91–112. http://dx.doi.org/10.4018/ijoci.2021040105.
Full textTANRIVERDIYEV, Elshan. "THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES." National Security Studies 23, no. 1 (March 30, 2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.
Full textMarkov, A., and N. Romashkina. "The Problem of Identifying the Source (Atribution) of Cyberattacks – An International Security Factor." World Economy and International Relations 66, no. 12 (2022): 58–68. http://dx.doi.org/10.20542/0131-2227-2022-66-12-58-68.
Full textHumeniuk, I. V., M. S. Basaraba, and O. V. Nekrilov. "METHODS OF ENSURING CYBER SECURITY OF CRITICAL COMPONENTSNETWORKS OF INFORMATION AND TELECOMMUNICATION SYSTEM." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 18 (December 30, 2020): 101–10. http://dx.doi.org/10.46972/2076-1546.2020.18.10.
Full textKyva, Vladyslav. "ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 53–70. http://dx.doi.org/10.28925/2663-4023.2022.15.5370.
Full textAhmed, Mohiuddin, David Cox, Benjamin Simpson, and Aseel Aloufi. "ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things." Applied Sciences 12, no. 4 (February 14, 2022): 1990. http://dx.doi.org/10.3390/app12041990.
Full textDiorditsa, Igor. "Modern legal content of optimization of directions of administrative and legal regulation of the state cybersecurity policy." Slovo of the National School of Judges of Ukraine, no. 4(33) (March 15, 2021): 31–42. http://dx.doi.org/10.37566/2707-6849-2020-4(33)-3.
Full text