Artigos de revistas sobre o tema "Cybernetic attacks"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cybernetic attacks".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile e Nurettin Erginoz. "Massive Cyber-Attacks Patterns Implemented with BDI Agents". Applied Mechanics and Materials 811 (novembro de 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.
Texto completo da fonteMoga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu e Ramona Lile. "Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures". Applied Mechanics and Materials 841 (junho de 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.
Texto completo da fonteKubanov, E. V. "Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration". Public administration aspects 6, n.º 8 (10 de setembro de 2018): 49–55. http://dx.doi.org/10.15421/151846.
Texto completo da fonteDudek, Wojciech, e Wojciech Szynkiewicz. "Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety". Journal of Telecommunications and Information Technology 2 (28 de junho de 2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.
Texto completo da fonteAkhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova e Sh Sagyndykova. "Decision support system for assessing the consequences of cyber attacks". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, n.º 1 (15 de março de 2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.
Texto completo da fonteOsak, Alexey, Daniil Panasetsky e Elena Buzina. "Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization". E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.
Texto completo da fonteLaktionov, Illia, Andrii Kmit, Ivan Opirskyy e Oleh Harasymchuk. "RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR". Cybersecurity: Education, Science, Technique 1, n.º 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.
Texto completo da fonteShukla, Prashant Kumar. "An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things". International Journal of Wireless and Ad Hoc Communication 7, n.º 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.
Texto completo da fonteYuyukin, I. V. "Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness". Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, n.º 3 (30 de julho de 2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.
Texto completo da fonteDhirani, Lubna Luxmi, e Thomas Newe. "Securing industry 5.0 using 6σ CYBERNETIC framework". Mehran University Research Journal of Engineering and Technology 43, n.º 2 (7 de abril de 2024): 220. http://dx.doi.org/10.22581/muet1982.3202.
Texto completo da fonteToctaquiza, Juan, Diego Carrión e Manuel Jaramillo. "An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks". Energies 16, n.º 6 (21 de março de 2023): 2879. http://dx.doi.org/10.3390/en16062879.
Texto completo da fontede Brito, Israel Barbosa, e Rafael T. de Sousa. "Development of an Open-Source Testbed Based on the Modbus Protocol for Cybersecurity Analysis of Nuclear Power Plants". Applied Sciences 12, n.º 15 (8 de agosto de 2022): 7942. http://dx.doi.org/10.3390/app12157942.
Texto completo da fonteLeszczuk, Sylwia. "Cyber conflict in the light of article 5 of the North Atlantic treaty". Історико-політичні проблеми сучасного світу, n.º 39 (16 de junho de 2019): 12–20. http://dx.doi.org/10.31861/mhpi2019.39.12-20.
Texto completo da fonteKybich, Yana. "Peculiarities of the cybersecurity of Ukraine formation in the conditions of hybrid war". Mediaforum : Analytics, Forecasts, Information Management, n.º 6 (17 de dezembro de 2018): 94–111. http://dx.doi.org/10.31861/mediaforum.2018.6.94-111.
Texto completo da fonteMarkov, A., e N. Romashkina. "The Problem of Identifying the Source (Atribution) of Cyberattacks – An International Security Factor". World Economy and International Relations 66, n.º 12 (2022): 58–68. http://dx.doi.org/10.20542/0131-2227-2022-66-12-58-68.
Texto completo da fonteSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny e Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation". Sensors 23, n.º 5 (3 de março de 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Texto completo da fonteShuklin, German, e Oleg Barabash. "Model of cybernetic attacks intensity calculation in the electronic trading system on the stock market". Advanced Information Systems 2, n.º 3 (28 de novembro de 2018): 111–14. http://dx.doi.org/10.20998/2522-9052.2018.3.19.
Texto completo da fonteSunhurova, S. R. "TYPES OF CYBERNETIC ATTACKS OF THE RUSSIAN FEDERATION AND THEIR SOCIO-POLITICAL CONSEQUENCES FOR UKRAINE". Scientific Journal "Regional Studies", n.º 28 (2022): 88–91. http://dx.doi.org/10.32782/2663-6170/2022.28.16.
Texto completo da fonteMacana, Carlos, Ahmed Abdou, Hemanshu Pota, Josep Guerrero e Juan Vasquez. "Cyber Physical Energy Systems Modules for Power Sharing Controllers in Inverter Based Microgrids". Inventions 3, n.º 3 (11 de setembro de 2018): 66. http://dx.doi.org/10.3390/inventions3030066.
Texto completo da fonteOsak, Alexey, Daniil Panasetsky e Elena Buzina. "Analysis of the emergency control and relay protection structures approached from the point of view of EPS reliability and survivability by taking into account cybersecurity threats". E3S Web of Conferences 139 (2019): 01029. http://dx.doi.org/10.1051/e3sconf/201913901029.
Texto completo da fonteSallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan e Majdi Ben Saad. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework". International Journal of Information Security and Privacy 5, n.º 4 (outubro de 2011): 47–58. http://dx.doi.org/10.4018/jisp.2011100104.
Texto completo da fonteMujević, Mersad. "SYNTHESIS OF THREATS AND RISKS OF CYBER SECURITY OF MONTENEGRO - THE VULNERABILITY ASPECT OF INFORMATION COMMUNICATION INFRASTRUCTURE". SCIENCE International Journal 1, n.º 1 (13 de dezembro de 2022): 1–12. http://dx.doi.org/10.35120/sciencej010101m.
Texto completo da fonteStankutė, Martyna. "Legal services today and in the future: how is changing the job of a lawyer?" Vilnius University Open Series, n.º 4 (16 de novembro de 2020): 248–73. http://dx.doi.org/10.15388/os.tmp.2020.12.
Texto completo da fonteMoskovchenko, Valeriy, Mikhail Gudkov e Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks". NBI Technologies, n.º 2 (fevereiro de 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Texto completo da fonteKalinin, Maxim, Roman Demidov e Peter Zegzhda. "Hybrid Neural Network Model for Protection of Dynamic Cyber Infrastructure". Nonlinear Phenomena in Complex Systems 22, n.º 4 (10 de dezembro de 2019): 375–82. http://dx.doi.org/10.33581/1561-4085-2019-22-4-375-382.
Texto completo da fonteMinaev, V. A., I. D. Korolev e V. V. Mukhortov. "INTEGRATED ASSESSMENT OF STABILITY FUNCTIONING COMPLEX TECHNICAL SYSTEMS IN THE TECHNO AND INFO SPHERE". Issues of radio electronics, n.º 5 (20 de maio de 2018): 89–94. http://dx.doi.org/10.21778/2218-5453-2018-5-89-94.
Texto completo da fonteSubach, Ihor, e Vitalii Fesokha. "Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules". Collection "Information technology and security" 5, n.º 2 (31 de dezembro de 2017): 145–52. http://dx.doi.org/10.20535/2411-1031.2017.5.2.136984.
Texto completo da fonteNovikova, А. "SOCIO-POLITICAL PROCESS AND INFORMATION SECURITY OF TRANSBAIKALIA AS PROTECTION OF NATIONAL INTERESTS". TRANSBAIKAL STATE UNIVERSITY JOURNAL 28, n.º 5 (2022): 70–76. http://dx.doi.org/10.21209/2227-9245-2022-28-5-70-76.
Texto completo da fonteHonório, Thiago Jacobino. "O uso de ciberataques em eleições e as Relações Internacionais | The use of cyberattacks in elections and International Relations". Mural Internacional 9, n.º 1 (30 de junho de 2018): 85–98. http://dx.doi.org/10.12957/rmi.2018.32570.
Texto completo da fonteRamos, Angélica, Elizabeth Torres Ramos, Abigail Alonso Reyes e Laura Segundo Gil. "Continuidad de negocio, análisis de la exposición al riesgo de ataques cibernéticos en empresas micro y pequeñas de la región Atlautla, Ozumba y Amecameca". Revista Relayn - Micro y Pequeñas empresas en Latinoamérica 5, n.º 2 (9 de novembro de 2021): 148–66. http://dx.doi.org/10.46990/relayn.2021.5.2.338.
Texto completo da fonteBuriachok, Volodymyr L., Svitlana M. Shevchenko e Pavlo M. Skladannyi. "VIRTUAL LABORATORY FOR MODELING OF PROCESSES IN INFORMATIONAL AND CYBER SECURITIES AS A FORM OF FORMING PRACTICAL SKILLS OF STUDENTS". Cybersecurity: Education, Science, Technique, n.º 2 (2018): 98–104. http://dx.doi.org/10.28925/2663-4023.2018.2.98104.
Texto completo da fonteRomashkina, N. P. "The International Legal Regime of Control over Cyber Weapons in the Future World Order: Threats and Prospects". Diplomaticheskaja sluzhba (Diplomatic Service), n.º 2 (31 de março de 2023): 150–61. http://dx.doi.org/10.33920/vne-01-2302-07.
Texto completo da fonteZegzhda, Dmitry, Daria Lavrova, Evgeny Pavlenko e Anna Shtyrkina. "Cyber Attack Prevention Based on Evolutionary Cybernetics Approach". Symmetry 12, n.º 11 (23 de novembro de 2020): 1931. http://dx.doi.org/10.3390/sym12111931.
Texto completo da fontePączkowski, Tomasz. "Cybernetic warfare – tips from Ukraine". Res Politicae 15 (2023): 73–86. http://dx.doi.org/10.16926/rp.2023.15.04.
Texto completo da fontePerwej, Dr Yusuf, Syed Qamar Abbas, Jai Pratap Dixit, Dr Nikhat Akhtar e Anurag Kumar Jaiswal. "A Systematic Literature Review on the Cyber Security". International Journal of Scientific Research and Management 9, n.º 12 (28 de dezembro de 2021): 669–710. http://dx.doi.org/10.18535/ijsrm/v9i12.ec04.
Texto completo da fonteKonnov, Vladimir. "The discursive practices of the research program of B. F. Lomov in promotion of Soviet engineering psychology". Vestnik of Saint Petersburg University. Psychology 12, n.º 1 (2022): 83–95. http://dx.doi.org/10.21638/spbu16.2022.107.
Texto completo da fonteКорягина, Светлана Александровна. "Рrotecting confidential information in a university environment". Management of Education, n.º 4(44) (15 de setembro de 2021): 209–16. http://dx.doi.org/10.25726/f9834-2371-9486-f.
Texto completo da fonteHashimoto, Wataru. "Autopoiesis, Observation and Informatics: Lessons from the Development of Autopoietic Systems Theory in Japan". tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, n.º 2 (30 de outubro de 2011): 414–23. http://dx.doi.org/10.31269/triplec.v9i2.294.
Texto completo da fonteHashimoto, Wataru. "Autopoiesis, Observation and Informatics: Lessons from the Development of Autopoietic Systems Theory in Japan". tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, n.º 2 (30 de outubro de 2011): 414–23. http://dx.doi.org/10.31269/vol9iss2pp414-423.
Texto completo da fonteASIMOPOLOS, Laurentiu A., Adrian-Aristide ASIMOPOLOS e Natalia-Silvia ASIMOPOLOS. "THE ROLE OF INTERDEPENDENCIES BETWEEN CRITICAL INFRASTRUCTURES IN RURAL DEVELOPMENT". Annals of Spiru Haret University. Economic Series 18, n.º 2 (29 de junho de 2018): 63–81. http://dx.doi.org/10.26458/1823.
Texto completo da fonteBardin, Andrea. "Simondon Contra New Materialism: Political Anthropology Reloaded". Theory, Culture & Society 38, n.º 5 (27 de maio de 2021): 25–44. http://dx.doi.org/10.1177/02632764211012047.
Texto completo da fonteMattiello, Elisa. "The Development of ESP Lexicon Through New Combining Forms". International Journal of English Linguistics 13, n.º 7 (20 de dezembro de 2023): 5. http://dx.doi.org/10.5539/ijel.v13n7p5.
Texto completo da fonteShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi e Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY". Cybersecurity: Education, Science, Technique 1, n.º 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.
Texto completo da fonteGriffin, Brandon, Keitavius Alexander, Xavier-Lewis Palmer e Lucas Potter. "Social-Engineering, Bio-economies, and Nation-State Ontological Security: A Commentary". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de fevereiro de 2023): 111–18. http://dx.doi.org/10.34190/iccws.18.1.1021.
Texto completo da fonteKubík, Josef, e Aleš Ruda. "Cyber security management model". International Journal of Public Administration, Management and Economic Development 8, n.º 2 (31 de dezembro de 2023). http://dx.doi.org/10.60026/ijpamed.v8i2.140.
Texto completo da fonteKotenko, Igor, e Alexander Ulanov. "AGENT-BASED SIMULATION OF DDOS ATTACKS AND DEFENSE MECHANISMS". International Journal of Computing, 1 de agosto de 2014, 113–23. http://dx.doi.org/10.47839/ijc.4.2.343.
Texto completo da fonteUngur-Brehoi, Carmen. "Romanian media and public's safety during information warfare". International Journal of Legal and Social Order 3, n.º 1 (1 de dezembro de 2023). http://dx.doi.org/10.55516/ijlso.v3i1.134.
Texto completo da fonteYASELSKA, NATALIA. "ACCESS TO JUSTICE DURING MARTIAL LAW". Law. Human. Environment 13, n.º 2 (7 de abril de 2022). http://dx.doi.org/10.31548/law2022.02.010.
Texto completo da fonteParikka, Jussi. "Viral Noise and the (Dis)Order of the Digital Culture". M/C Journal 7, n.º 6 (1 de janeiro de 2005). http://dx.doi.org/10.5204/mcj.2472.
Texto completo da fonteЫдырышбаева, М. Б. "МОДЕЛЬ ОПИСАНИЯ МЕТАЗНАНИЙ В СИСТЕМЕ ПОДДЕРЖКИ РЕШЕНИЙ ПО ОБЕСПЕЧЕНИЮ КИБЕРБЕЗОПАСНОСТИ". BULLETIN Series Physical and Mathematical Sciences 81, n.º 1(2023) (25 de setembro de 2023). http://dx.doi.org/10.51889/2959-5894.2023.81.1.021.
Texto completo da fonte