We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 139 results
  1. Cyber ISR and Analysis

    The traditional intelligence cycle of tasking, collection, processing, exploitation, and dissemination (T(C)PED) always included open-source elements...
    Chapter 2022
  2. Cyber Analysis and Targeting

    The goal of this book is to describe cyber analysis and targeting for defensive applications. One objective of develo** a cyber analysis and...
    Chapter 2022
  3. Cyber Intelligence Analysis

    Cyber intelligence (CYBINT) evolves recently as a discipline with major tasks related to cyber intelligence collection, analysis, and dissemination....
    Chapter 2023
  4. Cyber Case Studies

    Cyber operations are sometimes characterized as a “space between” policy and kinetic operations. The Schmitt Criteria is therefore suited to evaluate...
    Chapter 2022
  5. Measures of Cyber Performance and Effectiveness

    Cyber and aerial operations are both founded in intelligence collection. World War I (WW I) scout planes provide an analog cyber’s initial use...
    Chapter 2022
  6. Cyber Systems Design

    The increasing interconnectivity of information and operational technologies, including shared use of memory and processing components, is key...
    Chapter 2022
  7. Cyber Offense and Targeting

    The cyber process evaluator is introduced here from a combination of known kinetic target processes and best practices. For example, target system...
    Chapter 2022
  8. Cyber Modeling and Simulation for Analysis and Targeting

    Cyber modeling and simulation, depending on the targeting application, leverages a mosaic of tools across the people, policy, process, and technology...
    Chapter 2022
  9. Cyber Security and Defense for Analysis and Targeting

    The overlay of technical solutions onto cyber terrain is influenced by traditional security models (e.g., layered defense). However, simple layering...
    Chapter 2022
  10. Information Warfare and Cyber Education: Issues and Recommendations

    With the introduction of the Information Warfare (IW) paradigm across military service components, the institution of a new education focus is...
    Conference paper 2021
  11. Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge

    We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improving organisational...

    Petar Radanliev, David De Roure, ... Eirini Anthi in SN Applied Sciences
    Article Open access 06 October 2020
  12. Artificially Intelligent Cyber Security: Reducing Risk and Complexity

    Historically, research shows analysis, characterization, and classification of complex heterogeneous non-linear systems; and interactions have been...
    Conference paper 2021
  13. The Integration and Complications of Emerging Technologies in Modern Warfare

    Contained within this report is a framework designed to assist Australian Defence Force strategic commands to construct and establish cyber warfare...
    Matthew Walsh, Indra Seher, ... Amr Elchouemi in Innovative Technologies in Intelligent Systems and Industrial Applications
    Conference paper 2023
  14. Sliding Mode Resilient Control and Application Based on Intermediate Variable Observer in Smart Grid

    This paper focuses on the reliable operation of cyber-physical systems (CPS) under malicious attacks. First of all, according to the characteristics...

    Article 04 May 2023
  15. A proposed integrated manufacturing system of a workshop producing brass accessories in the context of industry 4.0

    Industry 4.0 is a basic step in the upgrade of manufacturing companies into digital enterprises. It allows more flexibility in manufacturing, as well...

    Ayoub Chakroun, Yasmina Hani, ... Faouzi Masmoudi in The International Journal of Advanced Manufacturing Technology
    Article 15 September 2022
  16. Cyberspace Analysis and Targeting Conclusions

    This book describes the role of analysis and targeting in cyberspace operations. We began, in Chap. 2 , with a...
    Chapter 2022
  17. Cybersecurity Space Operation Center: Countering Cyber Threats in the Space Domain

    The focus of this article is to describe the rapid changing nature of space systems where the electromagnetic spectrum and cybersecurity aspects...
    Salvador Llopis Sanchez, Robert Mazzolin, ... Jean Muylaert in Handbook of Space Security
    Reference work entry 2020
  18. Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques

    With the development of IT technology, cyber intelligence, surveillance, and reconnaissance (ISR) have become more important than traditional...

    Gyeongil Shin, Hosang Yooun, ... DongKyoo Shin in Soft Computing
    Article 24 August 2018
  19. Analysis and evaluation of Indian industrial system requirements and barriers affect during implementation of Industry 4.0 technologies

    In recent years, competition among the Indian manufacturing industries (IMI) has increased enormously in the global market. The current uncertainty...

    Article 19 February 2022
  20. Cyber Intelligence Analysis

    Cyber intelligence (CYBINT) evolves recently as a discipline with major tasks related to cyber intelligence collection, analysis, and dissemination....
    Chapter 2019
Did you find what you were looking for? Share feedback.