Artykuły w czasopismach na temat „Cyber defensive”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Cyber defensive”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Huntley, Wade, i Timothy Shives. "The Offense-Defense Balance in Cyberspace". European Conference on Cyber Warfare and Security 23, nr 1 (27.06.2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Pełny tekst źródłaGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model". International Journal of Applied Sciences & Development 1 (1.03.2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Pełny tekst źródłaSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber". Journal of Advanced Military Studies 12, nr 1 (30.04.2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Pełny tekst źródłaDuvenage, Petrus, Wilhelm Bernhardt i Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition". European Conference on Cyber Warfare and Security 22, nr 1 (19.06.2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Pełny tekst źródłaPattison, James. "From defence to offence: The ethics of private cybersecurity". European Journal of International Security 5, nr 2 (19.05.2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Pełny tekst źródłaAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef i Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams". Electronics 11, nr 10 (14.05.2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Pełny tekst źródłaAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan i Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities". Mehran University Research Journal of Engineering and Technology 37, nr 2 (1.04.2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Pełny tekst źródłaSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment". International Security 41, nr 3 (styczeń 2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Pełny tekst źródłaArmstrong, Miriam E., Keith S. Jones i Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, nr 1 (wrzesień 2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Pełny tekst źródłaMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law". International Journal of Cyber Warfare and Terrorism 8, nr 1 (styczeń 2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Pełny tekst źródłaHuskaj, Gazmend. "Offensive Cyberspace Operations for Cyber Security". International Conference on Cyber Warfare and Security 18, nr 1 (28.02.2023): 476–79. http://dx.doi.org/10.34190/iccws.18.1.1054.
Pełny tekst źródłaKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems". International Journal of Engineering and Applied Computer Science 02, nr 01 (25.01.2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Pełny tekst źródłaUsman, S. D., S. B. Junaidu, A. A. Obiniyi i M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward". Scientia Africana 20, nr 3 (26.01.2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Pełny tekst źródłaZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance". Surveillance & Society 16, nr 1 (1.04.2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Pełny tekst źródłaJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott i Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, nr 1 (wrzesień 2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Pełny tekst źródłaLegg, Phil, Alan Mills i Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range". Journal of The Colloquium for Information Systems Security Education 10, nr 1 (8.03.2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Pełny tekst źródłaByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson i Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations". Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Pełny tekst źródłaKullman, Kaur, Matt Ryan i Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations". IFAC-PapersOnLine 52, nr 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Pełny tekst źródłaRaska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change". SIRIUS – Zeitschrift für Strategische Analysen 4, nr 2 (26.05.2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.
Pełny tekst źródłaCarroll, Jami. "Agile Methods For Improved Cyber Operations Planning". European Conference on Cyber Warfare and Security 22, nr 1 (19.06.2023): 108–15. http://dx.doi.org/10.34190/eccws.22.1.1138.
Pełny tekst źródłaWu, Wenhao, i Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation". Electronics 8, nr 9 (5.09.2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Pełny tekst źródłaPoornima, B. "Cyber Preparedness of the Indian Armed Forces". Journal of Asian Security and International Affairs 10, nr 3 (28.11.2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Pełny tekst źródłaFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries". INFORMATION AND LAW, nr 1(48) (6.03.2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Pełny tekst źródłaMerlino, Jorge C., Mohammed Asiri i Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids". Sustainability 14, nr 5 (25.02.2022): 2730. http://dx.doi.org/10.3390/su14052730.
Pełny tekst źródłaSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine". Analytical papers of the Institute of Europe RAS, nr 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Pełny tekst źródłaKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, nr 1 (28.02.2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Pełny tekst źródłaWu, Zhijun, Ruochen Dong i Peng Wang. "Research on Game Theory of Air Traffic Management Cyber Physical System Security". Aerospace 9, nr 8 (23.07.2022): 397. http://dx.doi.org/10.3390/aerospace9080397.
Pełny tekst źródłaSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES". Cybersecurity & Cybercrime 1, nr 2 (2.03.2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Pełny tekst źródłaThenjiwe Sithole, Jaco Du Toit i Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles". European Conference on Cyber Warfare and Security 22, nr 1 (19.06.2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Pełny tekst źródłaMerz, Terry, i Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems". International Conference on Cyber Warfare and Security 18, nr 1 (28.02.2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Pełny tekst źródłaS, Mrs Yamuna. "Cloud Computing Based Cyber Defensive with Redundancy and Intruder Detection". International Journal for Research in Applied Science and Engineering Technology 7, nr 3 (31.03.2019): 1810–15. http://dx.doi.org/10.22214/ijraset.2019.3336.
Pełny tekst źródłaWagner, Neal, Cem Ş. Şahin, Michael Winterrose, James Riordan, Diana Hanson, Jaime Peña i William W. Streilein. "Quantifying the mission impact of network-level cyber defensive mitigations". Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 14, nr 3 (17.08.2016): 201–16. http://dx.doi.org/10.1177/1548512916662924.
Pełny tekst źródłaKaruna, Prakruthi, Hemant Purohit, Rajesh Ganesan i Sushil Jajodia. "Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception". IEEE Intelligent Systems 33, nr 5 (1.09.2018): 16–25. http://dx.doi.org/10.1109/mis.2018.2877277.
Pełny tekst źródłaLiu, Ning, Qing-Wei Chai, Shangkun Liu, Fanying Meng i Wei-Min Zheng. "Mixed Strategy Analysis in Attack-Defense Game Model Based on 5G Heterogeneous Network of CPS Using ncPSO". Security and Communication Networks 2022 (7.11.2022): 1–15. http://dx.doi.org/10.1155/2022/1181398.
Pełny tekst źródłaGrant, Tim. "Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?" European Conference on Cyber Warfare and Security 22, nr 1 (19.06.2023): 214–22. http://dx.doi.org/10.34190/eccws.22.1.1089.
Pełny tekst źródłaMangel, Marc, i Jimmie McEver. "Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid". Complexity 2021 (6.09.2021): 1–19. http://dx.doi.org/10.1155/2021/5584123.
Pełny tekst źródłaGanguli, Chirag, Shishir Kumar Shandilya, Maryna Nehrey i Myroslav Havryliuk. "Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense". Systems 11, nr 1 (5.01.2023): 27. http://dx.doi.org/10.3390/systems11010027.
Pełny tekst źródłaEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat i Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure". Journal of Cybersecurity and Privacy 4, nr 2 (9.06.2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Pełny tekst źródłaYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M i A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques". Journal of University of Shanghai for Science and Technology 23, nr 06 (22.06.2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Pełny tekst źródłaCzosseck, Christian, i Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict". International Journal of Cyber Warfare and Terrorism 2, nr 1 (styczeń 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Pełny tekst źródłaIlić, Maja. "Cyber security during covid-19 pandemic". Savremene studije bezbednosti, nr 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Pełny tekst źródłaSarjakivi, Pietari, Jouni Ihanus i Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields". European Conference on Cyber Warfare and Security 23, nr 1 (21.06.2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Pełny tekst źródłaZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting". Applied and Computational Engineering 38, nr 1 (22.01.2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Pełny tekst źródłaSzyłkowska, Monika. "Attributes of cyber conflict in the context of armed conflict – an outline of the problem". Przegląd Nauk o Obronności, nr 11 (14.04.2022): 134–54. http://dx.doi.org/10.37055/pno/148424.
Pełny tekst źródłaMaennel, Kaie, Agnė Brilingaitė, Linas Bukauskas, Aušrius Juozapavičius, Benjamin James Knox, Ricardo Gregorio Lugo, Olaf Maennel, Ginta Majore i Stefan Sütterlin. "A Multidimensional Cyber Defense Exercise: Emphasis on Emotional, Social, and Cognitive Aspects". SAGE Open 13, nr 1 (styczeń 2023): 215824402311563. http://dx.doi.org/10.1177/21582440231156367.
Pełny tekst źródłaMcCune, Jayson, i Dwight A. Haworth. "Securing America Against Cyber War". International Journal of Cyber Warfare and Terrorism 2, nr 1 (styczeń 2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Pełny tekst źródłaGENÇOĞLU, Muharrem Tuncay. "Mathematical Modeling of Cyber Attack and Defense". Bilgisayar Bilimleri ve Teknolojileri Dergisi 3, nr 1 (1.08.2022): 10–16. http://dx.doi.org/10.54047/bibted.997908.
Pełny tekst źródłaJain, Jay Kumar, i Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System". Journal of Artificial Intelligence, Machine Learning and Neural Network, nr 32 (24.02.2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Pełny tekst źródłaChu, Xiaodong, Yu Yi, Maosen Tang, Haoyi Huang i Lei Zhang. "Defensive resource allocation for cyber-physical systems in global energy interconnection". IOP Conference Series: Earth and Environmental Science 227 (2.03.2019): 042002. http://dx.doi.org/10.1088/1755-1315/227/4/042002.
Pełny tekst źródłaTrent, LTC Stoney, Robert Hoffman, Tony Leota, CPT Robert Frost i MAJ Danielle Gonzalez. "Cyberspace Operations and the People Who Perform Them". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, nr 1 (wrzesień 2016): 216–17. http://dx.doi.org/10.1177/1541931213601048.
Pełny tekst źródła