Literatura científica selecionada sobre o tema "Cyber defensive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cyber defensive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Cyber defensive"
Huntley, Wade, e Timothy Shives. "The Offense-Defense Balance in Cyberspace". European Conference on Cyber Warfare and Security 23, n.º 1 (27 de junho de 2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Texto completo da fonteGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model". International Journal of Applied Sciences & Development 1 (1 de março de 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Texto completo da fonteSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber". Journal of Advanced Military Studies 12, n.º 1 (30 de abril de 2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Texto completo da fonteDuvenage, Petrus, Wilhelm Bernhardt e Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition". European Conference on Cyber Warfare and Security 22, n.º 1 (19 de junho de 2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Texto completo da fontePattison, James. "From defence to offence: The ethics of private cybersecurity". European Journal of International Security 5, n.º 2 (19 de maio de 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Texto completo da fonteAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef e Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams". Electronics 11, n.º 10 (14 de maio de 2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Texto completo da fonteAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan e Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities". Mehran University Research Journal of Engineering and Technology 37, n.º 2 (1 de abril de 2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Texto completo da fonteSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment". International Security 41, n.º 3 (janeiro de 2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Texto completo da fonteArmstrong, Miriam E., Keith S. Jones e Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, n.º 1 (setembro de 2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Texto completo da fonteMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law". International Journal of Cyber Warfare and Terrorism 8, n.º 1 (janeiro de 2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Texto completo da fonteTeses / dissertações sobre o assunto "Cyber defensive"
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Texto completo da fonteWong, Tiong Pern. "Active cyber defense: enhancing national cyber defense". Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.
Texto completo da fonteStensboel, Karl Birger. "Norwegian cyber defense". Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.
Texto completo da fonteThis thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norways strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control. Norway must increasingly be perceived as a serious and tough player in cyberspace; this requires proactive thinking and offensive capabilities. An important first step would be to make the Ministry of Defense responsible for the nations cyber defense.
Cloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.
Texto completo da fonteThesis Advisor(s): Moran, Daniel ; Denning, Dorothy. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 93-102). Also available in print.
Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy". Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Texto completo da fonteSushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays". Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.
Texto completo da fonteMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability". Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Texto completo da fonteThe Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber technology, doctrine, and policy differentiate its posture as offensive or defensive? To evaluate Russian cyber capability, this thesis considers two factors—technology and geography—concluding that, although the Russian government is modifying its cyber terrain to improve defensiveness, Russia’s brandished cyber weapons suggest that it pursues offensive capability. To evaluate Russia’s posture differentiation, the thesis examines Russians’ understanding of cyber power, Russian information warfare and hybrid warfare doctrines, and the country’s international engagements, concluding that, although Russia has historically presented its posture as defensive, it is increasingly difficult to make that distinction. Finally, the thesis evaluates this state-level analysis in the broader context of the international system; Russia’s historical aggression and current behavior in cyberspace likely reflects Stephen van Evera’s explanATOry hypothesis for the causes of war—defensive expansion.
Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Texto completo da fonteDoctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems". Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Texto completo da fonteRecent research argued against the suitability of the current security solutions to CPS environments. We assert the need for new defense platforms that effectively and efficiently manage dynamic defense missions and toolsets in real-time with the following goals:
1) Achieve asymmetric advantage to CPS defenders, prohibitively increasing the cost for attackers;
2) Ensure resilient operations in presence of persistent and evolving attacks and failures; and
3) Facilitate defense alliances, effectively and efficiently diffusing defense intelligence and operations transcending organizational boundaries.
Our proposed solution comprehensively addresses the aforementioned goals offering an evolutionary CPS defense system. The presented CPS defense platform, termed CyPhyCARD (Cooperative Autonomous Resilient Defenses for Cyber-Physical systems) presents a unified defense platform to monitor, manage, and control the heterogeneous composition of CPS components. CyPhyCARD relies on three interrelated pillars to construct its defense platform. CyPhyCARD comprehensively integrates these pillars, therefore building a large scale, intrinsically resilient, self- and situation- aware, cooperative, and autonomous defense cloud-like platform that provisions adequate, prompt, and pervasive defense services for large-scale, heterogeneously-composed CPS. The CyPhyCARD pillars are:
1) Autonomous management platform (CyberX) for CyPhyCARD\'s foundation. CyberX enables application elasticity and autonomic adaptation to changes by runtime diversity employment, enhances the application resilience against attacks and failures by multimodal recovery mechanism, and enables unified application execution on heterogeneously composed platforms by a smart employment of a fine-grained environment-virtualization technology.
2) Diversity management system (ChameleonSoft) built on CyberX. ChameleonSoft encrypts software execution behavior by smart employment of runtime diversity across multiple dimensions to include time, space, and platform heterogeneity inducing a trace-resistant moving-target defense that works on securing CyPhyCARD platform against software attacks.
3) Evolutionary Sensory system (EvoSense) built on CyberX. EvoSense realizes pervasive, intrinsically-resilient, situation-aware sense and response system to seamlessly effect biological-immune-system like defense. EvoSense acts as a middle layer between the defense service provider(s) and the Target of Defense (ToD) creating a uniform defense interface that hides ToD\'s scale and heterogeneity concerns from defense-provisioning management.
CyPhyCARD is evaluated both qualitatively and quantitatively. The efficacy of the presented approach is assessed qualitatively, through a complex synthetic CPS attack scenario. In addition to the presented scenario, we devised multiple prototype packages for the presented pillars to assess their applicability in real execution environment and applications. Further, the efficacy and the efficiency of the presented approach is comprehensively assessed quantitatively by a set of custom-made simulation packages simulating each CyPhyCARD pillar for performance and security evaluation. The evaluation illustrated the success of CyPhyCARD and its constructing pillars to efficiently and effectively achieve its design objective with reasonable overhead.
Ph. D.
Nsambu, Emmanuel, e Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks". Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Texto completo da fonteLivros sobre o assunto "Cyber defensive"
Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.
Texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.
Texto completo da fonteKott, Alexander, Cliff Wang e Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.
Texto completo da fonteKott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.
Texto completo da fonteJajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang e Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.
Texto completo da fonteVijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy e Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.
Texto completo da fonteRani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi e Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.
Texto completo da fonte1958-, Nemati Hamid R., e Yang, Li, 1974 Oct. 29-, eds. Applied cryptography for cyber security and defense: Information encryption and cyphering. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteBelk, Robert. On the use of offensive cyber capabilities: A policy analysis for the Department of Defense Office of Cyber Policy. Cambridge, Mass: John F. Kennedy School of Government, 2012.
Encontre o texto completo da fonteMoore, Alexis. Cyber self-defense: Expert advice to avoid online predators, identity theft, and cyberbullying. Guilford, Connecticut: Lyons Press, 2014.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Cyber defensive"
Kassab, Hanna Samir. "Cyber-Vulnerability". In Prioritization Theory and Defensive Foreign Policy, 149–69. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-48018-3_7.
Texto completo da fonteKatagiri, Nori. "Why Defensive Measures Are Too Defensive: Strategy of Denial". In How Liberal Democracies Defend Their Cyber Networks from Hackers, 43–56. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_3.
Texto completo da fonteHuang, Linan, e Quanyan Zhu. "Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception". In Autonomous Cyber Deception, 75–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_5.
Texto completo da fonteTurtiainen, Hannu, Andrei Costin e Timo Hämäläinen. "Defensive Machine Learning Methods and the Cyber Defence Chain". In Artificial Intelligence and Cybersecurity, 147–63. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_7.
Texto completo da fonteOsula, Anna-Maria. "Building Cyber Resilience: The Defensive Shield for the EU". In New Security Challenges, 179–96. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08384-6_9.
Texto completo da fonteZhao, Jiamiao, Fei Hu e Xiali Hei. "Defensive Schemes for Cyber Security of Deep Reinforcement Learning". In AI, Machine Learning and Deep Learning, 139–49. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003187158-12.
Texto completo da fonteManasa, Koppula, e L. M. I. Leo Joseph. "IoT Security Vulnerabilities and Defensive Measures in Industry 4.0". In Artificial Intelligence and Cyber Security in Industry 4.0, 71–112. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2115-7_4.
Texto completo da fonteFritsch, Lothar, Aws Jaber e Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware". In Communications in Computer and Information Science, 41–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Texto completo da fonteHodges, Duncan, e Oliver Buckley. "Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals". In Human Aspects of Information Security, Privacy and Trust, 494–506. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_34.
Texto completo da fonteCabada, Pavol. "Cyber-Democracy and Cyber-Defense". In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense, 1–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0_11-1.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Cyber defensive"
Mckneely, Jennifer, Tara Sell, Kathleen Straub e Daniel Thomas. "Defensive Cyber Maneuvers to Disrupt Cyber Attackers". In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2023. http://dx.doi.org/10.24251/hicss.2023.814.
Texto completo da fonteFerguson-Walter, Kimberly, Sunny Fugate, Justin Mauger e Maxine Major. "Game theory for adaptive defensive cyber deception". In the 6th Annual Symposium. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314063.
Texto completo da fonteBierbrauer, David, Robert Schabinger, Caleb Carlin, Jonathan Mullin, John Pavlik e Nathaniel D. Bastian. "Autonomous cyber warfare agents: dynamic reinforcement learning for defensive cyber operations". In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, editado por Latasha Solomon e Peter J. Schwartz. SPIE, 2023. http://dx.doi.org/10.1117/12.2663093.
Texto completo da fonteParker, Thomas, Jeremy Jones, Joshua Mayberry, Gassium Chanman, Zachary Staples, John McEachen e Murali Tummala. "Defensive Cyber Operations in a Software-Defined Network". In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.688.
Texto completo da fonteHu, Bing, Longqiang Zhang, Zhiwu Guo, Youran Li, Wei Sun, Liang Zhou e Yong Tian. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants". In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.
Texto completo da fonteMoody, William, Hongxin Hu e Amy Apon. "Defensive Maneuver Cyber Platform Modeling with Stochastic Petri Nets". In 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. ICST, 2014. http://dx.doi.org/10.4108/icst.collaboratecom.2014.257559.
Texto completo da fonteChiang, Cho-Yu J., Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam e Massimiliano Albanese. "On Defensive Cyber Deception: A Case Study Using SDN". In MILCOM 2018 - IEEE Military Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/milcom.2018.8599755.
Texto completo da fonteWood, Paul, Saurabh Bagchi e Alefiya Hussain. "Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems". In 2015 IEEE International Parallel and Distributed Processing Symposium Workshop (IPDPSW). IEEE, 2015. http://dx.doi.org/10.1109/ipdpsw.2015.112.
Texto completo da fonteRizwan, Kainat, Mudassar Ahmad e Muhammad Asif Habib. "Cyber Automated Network Resilience Defensive Approach against Malware Images". In 2022 International Conference on Frontiers of Information Technology (FIT). IEEE, 2022. http://dx.doi.org/10.1109/fit57066.2022.00051.
Texto completo da fonteKim, Charles, e Dayne Robinson. "Modbus monitoring for networked control systems of cyber-defensive architecture". In 2017 Annual IEEE International Systems Conference (SysCon). IEEE, 2017. http://dx.doi.org/10.1109/syscon.2017.7934750.
Texto completo da fonteRelatórios de organizações sobre o assunto "Cyber defensive"
Carey, III, e Casimir C. NATO's Options for Defensive Cyber Against Non-State Actors. Fort Belvoir, VA: Defense Technical Information Center, abril de 2013. http://dx.doi.org/10.21236/ada592754.
Texto completo da fonteSu, Fei, Larisa Saveleva Dovgal e Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, novembro de 2023. http://dx.doi.org/10.55163/ttrc4774.
Texto completo da fonteBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, maio de 2020. http://dx.doi.org/10.51593/2020ca001.
Texto completo da fonteLohn, Andrew, Anna Knack, Ant Burke e Krystal Jackson. Autonomous Cyber Defense. Center for Security and Emerging Technology, junho de 2023. http://dx.doi.org/10.51593/2022ca007.
Texto completo da fonteHoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, janeiro de 2021. http://dx.doi.org/10.51593/2020ca007.
Texto completo da fontePlantenga, Todd, e Tamara Gibson Kolda. Analytics for Cyber Network Defense. Office of Scientific and Technical Information (OSTI), junho de 2011. http://dx.doi.org/10.2172/1113857.
Texto completo da fonteSmith, Randall. Multi-Community Cyber Defense (MCCD). Fort Belvoir, VA: Defense Technical Information Center, novembro de 2002. http://dx.doi.org/10.21236/ada408408.
Texto completo da fonteGiles, Keir, e Kim Hartmann. Cyber Defense: An International View. Fort Belvoir, VA: Defense Technical Information Center, setembro de 2015. http://dx.doi.org/10.21236/ada622264.
Texto completo da fonteLuckinbill, Ryan. Cyber Defense Competition Card Game. Ames (Iowa): Iowa State University, janeiro de 2019. http://dx.doi.org/10.31274/cc-20240624-471.
Texto completo da fonteColbaugh, Richard, e Kristin L. Glass. Proactive defense for evolving cyber threats. Office of Scientific and Technical Information (OSTI), novembro de 2012. http://dx.doi.org/10.2172/1059470.
Texto completo da fonte