Articoli di riviste sul tema "Cyber defensive"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cyber defensive".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Huntley, Wade, e Timothy Shives. "The Offense-Defense Balance in Cyberspace". European Conference on Cyber Warfare and Security 23, n. 1 (27 giugno 2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Testo completoGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model". International Journal of Applied Sciences & Development 1 (1 marzo 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Testo completoSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber". Journal of Advanced Military Studies 12, n. 1 (30 aprile 2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Testo completoDuvenage, Petrus, Wilhelm Bernhardt e Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition". European Conference on Cyber Warfare and Security 22, n. 1 (19 giugno 2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Testo completoPattison, James. "From defence to offence: The ethics of private cybersecurity". European Journal of International Security 5, n. 2 (19 maggio 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Testo completoAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef e Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams". Electronics 11, n. 10 (14 maggio 2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Testo completoAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan e Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities". Mehran University Research Journal of Engineering and Technology 37, n. 2 (1 aprile 2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Testo completoSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment". International Security 41, n. 3 (gennaio 2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Testo completoArmstrong, Miriam E., Keith S. Jones e Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, n. 1 (settembre 2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Testo completoMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law". International Journal of Cyber Warfare and Terrorism 8, n. 1 (gennaio 2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Testo completoHuskaj, Gazmend. "Offensive Cyberspace Operations for Cyber Security". International Conference on Cyber Warfare and Security 18, n. 1 (28 febbraio 2023): 476–79. http://dx.doi.org/10.34190/iccws.18.1.1054.
Testo completoKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems". International Journal of Engineering and Applied Computer Science 02, n. 01 (25 gennaio 2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Testo completoUsman, S. D., S. B. Junaidu, A. A. Obiniyi e M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward". Scientia Africana 20, n. 3 (26 gennaio 2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Testo completoZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance". Surveillance & Society 16, n. 1 (1 aprile 2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Testo completoJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott e Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, n. 1 (settembre 2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Testo completoLegg, Phil, Alan Mills e Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range". Journal of The Colloquium for Information Systems Security Education 10, n. 1 (8 marzo 2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Testo completoByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson e Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations". Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Testo completoKullman, Kaur, Matt Ryan e Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations". IFAC-PapersOnLine 52, n. 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Testo completoRaska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change". SIRIUS – Zeitschrift für Strategische Analysen 4, n. 2 (26 maggio 2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.
Testo completoCarroll, Jami. "Agile Methods For Improved Cyber Operations Planning". European Conference on Cyber Warfare and Security 22, n. 1 (19 giugno 2023): 108–15. http://dx.doi.org/10.34190/eccws.22.1.1138.
Testo completoWu, Wenhao, e Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation". Electronics 8, n. 9 (5 settembre 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Testo completoPoornima, B. "Cyber Preparedness of the Indian Armed Forces". Journal of Asian Security and International Affairs 10, n. 3 (28 novembre 2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Testo completoFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries". INFORMATION AND LAW, n. 1(48) (6 marzo 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Testo completoMerlino, Jorge C., Mohammed Asiri e Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids". Sustainability 14, n. 5 (25 febbraio 2022): 2730. http://dx.doi.org/10.3390/su14052730.
Testo completoSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine". Analytical papers of the Institute of Europe RAS, n. 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Testo completoKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, n. 1 (28 febbraio 2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Testo completoWu, Zhijun, Ruochen Dong e Peng Wang. "Research on Game Theory of Air Traffic Management Cyber Physical System Security". Aerospace 9, n. 8 (23 luglio 2022): 397. http://dx.doi.org/10.3390/aerospace9080397.
Testo completoSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES". Cybersecurity & Cybercrime 1, n. 2 (2 marzo 2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Testo completoThenjiwe Sithole, Jaco Du Toit e Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles". European Conference on Cyber Warfare and Security 22, n. 1 (19 giugno 2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Testo completoMerz, Terry, e Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems". International Conference on Cyber Warfare and Security 18, n. 1 (28 febbraio 2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Testo completoS, Mrs Yamuna. "Cloud Computing Based Cyber Defensive with Redundancy and Intruder Detection". International Journal for Research in Applied Science and Engineering Technology 7, n. 3 (31 marzo 2019): 1810–15. http://dx.doi.org/10.22214/ijraset.2019.3336.
Testo completoWagner, Neal, Cem Ş. Şahin, Michael Winterrose, James Riordan, Diana Hanson, Jaime Peña e William W. Streilein. "Quantifying the mission impact of network-level cyber defensive mitigations". Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 14, n. 3 (17 agosto 2016): 201–16. http://dx.doi.org/10.1177/1548512916662924.
Testo completoKaruna, Prakruthi, Hemant Purohit, Rajesh Ganesan e Sushil Jajodia. "Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception". IEEE Intelligent Systems 33, n. 5 (1 settembre 2018): 16–25. http://dx.doi.org/10.1109/mis.2018.2877277.
Testo completoLiu, Ning, Qing-Wei Chai, Shangkun Liu, Fanying Meng e Wei-Min Zheng. "Mixed Strategy Analysis in Attack-Defense Game Model Based on 5G Heterogeneous Network of CPS Using ncPSO". Security and Communication Networks 2022 (7 novembre 2022): 1–15. http://dx.doi.org/10.1155/2022/1181398.
Testo completoGrant, Tim. "Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?" European Conference on Cyber Warfare and Security 22, n. 1 (19 giugno 2023): 214–22. http://dx.doi.org/10.34190/eccws.22.1.1089.
Testo completoMangel, Marc, e Jimmie McEver. "Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid". Complexity 2021 (6 settembre 2021): 1–19. http://dx.doi.org/10.1155/2021/5584123.
Testo completoGanguli, Chirag, Shishir Kumar Shandilya, Maryna Nehrey e Myroslav Havryliuk. "Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense". Systems 11, n. 1 (5 gennaio 2023): 27. http://dx.doi.org/10.3390/systems11010027.
Testo completoEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat e Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure". Journal of Cybersecurity and Privacy 4, n. 2 (9 giugno 2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Testo completoYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M e A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques". Journal of University of Shanghai for Science and Technology 23, n. 06 (22 giugno 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Testo completoCzosseck, Christian, e Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict". International Journal of Cyber Warfare and Terrorism 2, n. 1 (gennaio 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Testo completoIlić, Maja. "Cyber security during covid-19 pandemic". Savremene studije bezbednosti, n. 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Testo completoSarjakivi, Pietari, Jouni Ihanus e Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields". European Conference on Cyber Warfare and Security 23, n. 1 (21 giugno 2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Testo completoZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting". Applied and Computational Engineering 38, n. 1 (22 gennaio 2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Testo completoSzyłkowska, Monika. "Attributes of cyber conflict in the context of armed conflict – an outline of the problem". Przegląd Nauk o Obronności, n. 11 (14 aprile 2022): 134–54. http://dx.doi.org/10.37055/pno/148424.
Testo completoMaennel, Kaie, Agnė Brilingaitė, Linas Bukauskas, Aušrius Juozapavičius, Benjamin James Knox, Ricardo Gregorio Lugo, Olaf Maennel, Ginta Majore e Stefan Sütterlin. "A Multidimensional Cyber Defense Exercise: Emphasis on Emotional, Social, and Cognitive Aspects". SAGE Open 13, n. 1 (gennaio 2023): 215824402311563. http://dx.doi.org/10.1177/21582440231156367.
Testo completoMcCune, Jayson, e Dwight A. Haworth. "Securing America Against Cyber War". International Journal of Cyber Warfare and Terrorism 2, n. 1 (gennaio 2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Testo completoGENÇOĞLU, Muharrem Tuncay. "Mathematical Modeling of Cyber Attack and Defense". Bilgisayar Bilimleri ve Teknolojileri Dergisi 3, n. 1 (1 agosto 2022): 10–16. http://dx.doi.org/10.54047/bibted.997908.
Testo completoJain, Jay Kumar, e Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System". Journal of Artificial Intelligence, Machine Learning and Neural Network, n. 32 (24 febbraio 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Testo completoChu, Xiaodong, Yu Yi, Maosen Tang, Haoyi Huang e Lei Zhang. "Defensive resource allocation for cyber-physical systems in global energy interconnection". IOP Conference Series: Earth and Environmental Science 227 (2 marzo 2019): 042002. http://dx.doi.org/10.1088/1755-1315/227/4/042002.
Testo completoTrent, LTC Stoney, Robert Hoffman, Tony Leota, CPT Robert Frost e MAJ Danielle Gonzalez. "Cyberspace Operations and the People Who Perform Them". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n. 1 (settembre 2016): 216–17. http://dx.doi.org/10.1177/1541931213601048.
Testo completo