Artigos de revistas sobre o tema "Cyber defensive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cyber defensive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Huntley, Wade, e Timothy Shives. "The Offense-Defense Balance in Cyberspace". European Conference on Cyber Warfare and Security 23, n.º 1 (27 de junho de 2024): 836–43. http://dx.doi.org/10.34190/eccws.23.1.2500.
Texto completo da fonteGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model". International Journal of Applied Sciences & Development 1 (1 de março de 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Texto completo da fonteSegell, Glen. "Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber". Journal of Advanced Military Studies 12, n.º 1 (30 de abril de 2021): 86–111. http://dx.doi.org/10.21140/mcuj.20211201004.
Texto completo da fonteDuvenage, Petrus, Wilhelm Bernhardt e Sebastian Von Solms. "Cyber power in the African context: an exploratory analysis and proposition". European Conference on Cyber Warfare and Security 22, n.º 1 (19 de junho de 2023): 177–86. http://dx.doi.org/10.34190/eccws.22.1.1046.
Texto completo da fontePattison, James. "From defence to offence: The ethics of private cybersecurity". European Journal of International Security 5, n.º 2 (19 de maio de 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Texto completo da fonteAlothman, Basil, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef e Murad Khan. "Developing a Cyber Incident Exercises Model to Educate Security Teams". Electronics 11, n.º 10 (14 de maio de 2022): 1575. http://dx.doi.org/10.3390/electronics11101575.
Texto completo da fonteAwan, Jawad Hussain, Shahzad Memon, Sheeraz Memon, Kamran Taj Pathan e Niaz Hussain Arijo. "Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities". Mehran University Research Journal of Engineering and Technology 37, n.º 2 (1 de abril de 2018): 359–66. http://dx.doi.org/10.22581/muet1982.1802.12.
Texto completo da fonteSlayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment". International Security 41, n.º 3 (janeiro de 2017): 72–109. http://dx.doi.org/10.1162/isec_a_00267.
Texto completo da fonteArmstrong, Miriam E., Keith S. Jones e Akbar Siami Namin. "Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, n.º 1 (setembro de 2017): 1318–22. http://dx.doi.org/10.1177/1541931213601812.
Texto completo da fonteMali, Prashant. "Defining Cyber Weapon in Context of Technology and Law". International Journal of Cyber Warfare and Terrorism 8, n.º 1 (janeiro de 2018): 43–55. http://dx.doi.org/10.4018/ijcwt.2018010104.
Texto completo da fonteHuskaj, Gazmend. "Offensive Cyberspace Operations for Cyber Security". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de fevereiro de 2023): 476–79. http://dx.doi.org/10.34190/iccws.18.1.1054.
Texto completo da fonteKim, Charles. "Cyber-Defensive Architecture for Networked Industrial Control Systems". International Journal of Engineering and Applied Computer Science 02, n.º 01 (25 de janeiro de 2017): 01–09. http://dx.doi.org/10.24032/ijeacs/0201/01.
Texto completo da fonteUsman, S. D., S. B. Junaidu, A. A. Obiniyi e M. B. Bagiwa. "A survey on global cyber-warfare and Nigerian’s cyber defensive strategy: A way forward". Scientia Africana 20, n.º 3 (26 de janeiro de 2022): 241–56. http://dx.doi.org/10.4314/sa.v20i3.20.
Texto completo da fonteZajko, Mike. "Security against Surveillance: IT Security as Resistance to Pervasive Surveillance". Surveillance & Society 16, n.º 1 (1 de abril de 2018): 39–52. http://dx.doi.org/10.24908/ss.v16i1.5316.
Texto completo da fonteJohnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott e Nancy J. Cooke. "Investigating Cyber Attacker Team Cognition". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, n.º 1 (setembro de 2022): 105–9. http://dx.doi.org/10.1177/1071181322661132.
Texto completo da fonteLegg, Phil, Alan Mills e Ian Johnson. "Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range". Journal of The Colloquium for Information Systems Security Education 10, n.º 1 (8 de março de 2023): 9. http://dx.doi.org/10.53735/cisse.v10i1.172.
Texto completo da fonteByrne, D. J., David Morgan, Kymie Tan, Bryan Johnson e Chris Dorros. "Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations". Procedia Computer Science 28 (2014): 522–30. http://dx.doi.org/10.1016/j.procs.2014.03.064.
Texto completo da fonteKullman, Kaur, Matt Ryan e Lee Trossbach. "VR/MR Supporting the Future of Defensive Cyber Operations". IFAC-PapersOnLine 52, n.º 19 (2019): 181–86. http://dx.doi.org/10.1016/j.ifacol.2019.12.093.
Texto completo da fonteRaska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change". SIRIUS – Zeitschrift für Strategische Analysen 4, n.º 2 (26 de maio de 2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.
Texto completo da fonteCarroll, Jami. "Agile Methods For Improved Cyber Operations Planning". European Conference on Cyber Warfare and Security 22, n.º 1 (19 de junho de 2023): 108–15. http://dx.doi.org/10.34190/eccws.22.1.1138.
Texto completo da fonteWu, Wenhao, e Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation". Electronics 8, n.º 9 (5 de setembro de 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Texto completo da fontePoornima, B. "Cyber Preparedness of the Indian Armed Forces". Journal of Asian Security and International Affairs 10, n.º 3 (28 de novembro de 2023): 301–24. http://dx.doi.org/10.1177/23477970231207250.
Texto completo da fonteFEDIENKO, O. "The current trends of regulatory support of institutional formation of cybertroops (cyber force): the experience of certain NATO countries". INFORMATION AND LAW, n.º 1(48) (6 de março de 2024): 150–61. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300800.
Texto completo da fonteMerlino, Jorge C., Mohammed Asiri e Neetesh Saxena. "DDoS Cyber-Incident Detection in Smart Grids". Sustainability 14, n.º 5 (25 de fevereiro de 2022): 2730. http://dx.doi.org/10.3390/su14052730.
Texto completo da fonteSharikov, Pavel. "Military cybersecurity issues in the context of Russia’s special military operation in Ukraine". Analytical papers of the Institute of Europe RAS, n.º 2 (2022): 5–12. http://dx.doi.org/10.15211/analytics21320220512.
Texto completo da fonteKantola, Harry. "Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case Ukraine." International Conference on Cyber Warfare and Security 18, n.º 1 (28 de fevereiro de 2023): 480–88. http://dx.doi.org/10.34190/iccws.18.1.975.
Texto completo da fonteWu, Zhijun, Ruochen Dong e Peng Wang. "Research on Game Theory of Air Traffic Management Cyber Physical System Security". Aerospace 9, n.º 8 (23 de julho de 2022): 397. http://dx.doi.org/10.3390/aerospace9080397.
Texto completo da fonteSMUTEK, Bartosz. "NORTH KOREA’S CYBER CAPABILITIES". Cybersecurity & Cybercrime 1, n.º 2 (2 de março de 2023): 204–20. http://dx.doi.org/10.5604/01.3001.0053.8030.
Texto completo da fonteThenjiwe Sithole, Jaco Du Toit e Sebastian Von Solms. "A Cyber Counterintelligence Competence Framework: Developing the Job Roles". European Conference on Cyber Warfare and Security 22, n.º 1 (19 de junho de 2023): 450–57. http://dx.doi.org/10.34190/eccws.22.1.1093.
Texto completo da fonteMerz, Terry, e Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de fevereiro de 2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Texto completo da fonteS, Mrs Yamuna. "Cloud Computing Based Cyber Defensive with Redundancy and Intruder Detection". International Journal for Research in Applied Science and Engineering Technology 7, n.º 3 (31 de março de 2019): 1810–15. http://dx.doi.org/10.22214/ijraset.2019.3336.
Texto completo da fonteWagner, Neal, Cem Ş. Şahin, Michael Winterrose, James Riordan, Diana Hanson, Jaime Peña e William W. Streilein. "Quantifying the mission impact of network-level cyber defensive mitigations". Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 14, n.º 3 (17 de agosto de 2016): 201–16. http://dx.doi.org/10.1177/1548512916662924.
Texto completo da fonteKaruna, Prakruthi, Hemant Purohit, Rajesh Ganesan e Sushil Jajodia. "Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception". IEEE Intelligent Systems 33, n.º 5 (1 de setembro de 2018): 16–25. http://dx.doi.org/10.1109/mis.2018.2877277.
Texto completo da fonteLiu, Ning, Qing-Wei Chai, Shangkun Liu, Fanying Meng e Wei-Min Zheng. "Mixed Strategy Analysis in Attack-Defense Game Model Based on 5G Heterogeneous Network of CPS Using ncPSO". Security and Communication Networks 2022 (7 de novembro de 2022): 1–15. http://dx.doi.org/10.1155/2022/1181398.
Texto completo da fonteGrant, Tim. "Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?" European Conference on Cyber Warfare and Security 22, n.º 1 (19 de junho de 2023): 214–22. http://dx.doi.org/10.34190/eccws.22.1.1089.
Texto completo da fonteMangel, Marc, e Jimmie McEver. "Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid". Complexity 2021 (6 de setembro de 2021): 1–19. http://dx.doi.org/10.1155/2021/5584123.
Texto completo da fonteGanguli, Chirag, Shishir Kumar Shandilya, Maryna Nehrey e Myroslav Havryliuk. "Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense". Systems 11, n.º 1 (5 de janeiro de 2023): 27. http://dx.doi.org/10.3390/systems11010027.
Texto completo da fonteEl Amin, Habib, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat e Antoine Feghali. "An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure". Journal of Cybersecurity and Privacy 4, n.º 2 (9 de junho de 2024): 357–81. http://dx.doi.org/10.3390/jcp4020018.
Texto completo da fonteYamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M e A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques". Journal of University of Shanghai for Science and Technology 23, n.º 06 (22 de junho de 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Texto completo da fonteCzosseck, Christian, e Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict". International Journal of Cyber Warfare and Terrorism 2, n.º 1 (janeiro de 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Texto completo da fonteIlić, Maja. "Cyber security during covid-19 pandemic". Savremene studije bezbednosti, n.º 2 (2023): 153–71. http://dx.doi.org/10.5937/ssb2302153i.
Texto completo da fonteSarjakivi, Pietari, Jouni Ihanus e Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields". European Conference on Cyber Warfare and Security 23, n.º 1 (21 de junho de 2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.
Texto completo da fonteZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting". Applied and Computational Engineering 38, n.º 1 (22 de janeiro de 2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Texto completo da fonteSzyłkowska, Monika. "Attributes of cyber conflict in the context of armed conflict – an outline of the problem". Przegląd Nauk o Obronności, n.º 11 (14 de abril de 2022): 134–54. http://dx.doi.org/10.37055/pno/148424.
Texto completo da fonteMaennel, Kaie, Agnė Brilingaitė, Linas Bukauskas, Aušrius Juozapavičius, Benjamin James Knox, Ricardo Gregorio Lugo, Olaf Maennel, Ginta Majore e Stefan Sütterlin. "A Multidimensional Cyber Defense Exercise: Emphasis on Emotional, Social, and Cognitive Aspects". SAGE Open 13, n.º 1 (janeiro de 2023): 215824402311563. http://dx.doi.org/10.1177/21582440231156367.
Texto completo da fonteMcCune, Jayson, e Dwight A. Haworth. "Securing America Against Cyber War". International Journal of Cyber Warfare and Terrorism 2, n.º 1 (janeiro de 2012): 39–49. http://dx.doi.org/10.4018/ijcwt.2012010104.
Texto completo da fonteGENÇOĞLU, Muharrem Tuncay. "Mathematical Modeling of Cyber Attack and Defense". Bilgisayar Bilimleri ve Teknolojileri Dergisi 3, n.º 1 (1 de agosto de 2022): 10–16. http://dx.doi.org/10.54047/bibted.997908.
Texto completo da fonteJain, Jay Kumar, e Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System". Journal of Artificial Intelligence, Machine Learning and Neural Network, n.º 32 (24 de fevereiro de 2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.
Texto completo da fonteChu, Xiaodong, Yu Yi, Maosen Tang, Haoyi Huang e Lei Zhang. "Defensive resource allocation for cyber-physical systems in global energy interconnection". IOP Conference Series: Earth and Environmental Science 227 (2 de março de 2019): 042002. http://dx.doi.org/10.1088/1755-1315/227/4/042002.
Texto completo da fonteTrent, LTC Stoney, Robert Hoffman, Tony Leota, CPT Robert Frost e MAJ Danielle Gonzalez. "Cyberspace Operations and the People Who Perform Them". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n.º 1 (setembro de 2016): 216–17. http://dx.doi.org/10.1177/1541931213601048.
Texto completo da fonte