Search
Search Results
-
Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review
Today’s world is highly dependent on electronic technology and protecting this data from cyber-attacks is a challenging issue. Cyberspace is... -
The Integration and Complications of Emerging Technologies in Modern Warfare
Contained within this report is a framework designed to assist Australian Defence Force strategic commands to construct and establish cyber warfare... -
Ransomware 3.0—A Weapon for Next-Generation Information Warfare
Ransomware 3.0 is an emerging threat where cyber criminals target critical infrastructures and tamper with the data stored on computing devices.... -
A narrative perspective of island detection methods under the lens of cyber-attack in data-driven smart grid
As criminals and hackers are develo** new methods to interfere with the operation of the power grid, the nature of grid vulnerabilities and threats...
-
Artificial intelligence in the long view: from mechanical intelligence to cyber-social systems
Artificial intelligence (AI) is emerging as a defining technology of our time, a source of fear as often as inspiration. Immersed in its...
-
Information Warfare and Cyber Education: Issues and Recommendations
With the introduction of the Information Warfare (IW) paradigm across military service components, the institution of a new education focus is... -
A Brief Discussion of Winning Mechanism of Intelligentized Warfare
The rapid development of AI technologies and its integration with traditional technologies have accelerated the intelligentized warfare... -
Cyber Security Threat, it’s Risks and Susceptibilities, in the Global Perspective
Cyber threats have become a big problem for the world today and out of many, the most prominent in this respect are social engineering and cyber... -
Assessment of Attribution in Cyber Deterrence: A Fuzzy Entropy Approach
Against the threat of cyber warfare and cyber-attacks involving cyber kinetics by state and non-state elements traditionally various and the kind of... -
Cyber Resilience for SDG Towards the Digitization: An Imperial Study
With the digitization and evolution of Internet technology, the prevalence of most cyber-attacks is increasing. As society adopts digitalization, the... -
Cyber Influence Operations
Influence operations (IO) date from time immemorial as strategic and tactical tools that are used to complement diplomacy. More recently, strategic... -
Cyber Operational Planning
The process of collecting business, software, or information systems’ requirements in general and security requirements in particular can take... -
Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation
As the cyber domain continues to develop, it becomes increasingly crucial to provide cybersecurity workers with state-of-the-art competencies. This... -
Military Cyber Activities in Russia’s War Against Ukraine and Their Significance for the Debates on the Containment of a Cyberwar
Russia’s invasion of Ukraine and the ensuing war have, among many other security certainties, demonstrated for the first time the role of cyberspace... -
Study of the Need for Effective Cyber Security Trainings in India
With the availability of android phones and internet in every hand, the rate of cyber-crimes have increased tremendously. This increase in... -
Is Cyber Warfare an Alternative?
The possibility of using computerized means in offensive action against civilian or military installations from enemy countries is a real. Given the... -
Challenges for Cyber Arms Control: A Qualitative Expert Interview Study
Cyberspace and its ongoing militarization have already been a topic in international fora as well as scientific debates for several years. Many... -
Measures of Cyber Performance and Effectiveness
Cyber and aerial operations are both founded in intelligence collection. World War I (WW I) scout planes provide an analog cyber’s initial use... -
An Analysis Study of Security Threats, Vulnerabilities Challenges of Cyber-Physical Systems
Cyber-Physical Systems (CPS) have the property that can be accessed and managed remotely and it is almost anywhere. Because of these characteristics,... -
C2 Twin Network and Full Lifecycle Management for Intelligent Warfare
With the widespread application of artificial intelligence in military fields, intelligent warfare is increasingly becoming the focus of attention....