We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 637 results
  1. Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review

    Today’s world is highly dependent on electronic technology and protecting this data from cyber-attacks is a challenging issue. Cyberspace is...
    Conference paper 2023
  2. The Integration and Complications of Emerging Technologies in Modern Warfare

    Contained within this report is a framework designed to assist Australian Defence Force strategic commands to construct and establish cyber warfare...
    Matthew Walsh, Indra Seher, ... Amr Elchouemi in Innovative Technologies in Intelligent Systems and Industrial Applications
    Conference paper 2023
  3. Ransomware 3.0—A Weapon for Next-Generation Information Warfare

    Ransomware 3.0 is an emerging threat where cyber criminals target critical infrastructures and tamper with the data stored on computing devices....
    Mohiuddin Ahmed, A. N. M. Bazlur Rashid, Al-Sakib Khan Pathan in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  4. A narrative perspective of island detection methods under the lens of cyber-attack in data-driven smart grid

    As criminals and hackers are develo** new methods to interfere with the operation of the power grid, the nature of grid vulnerabilities and threats...

    Apoorva Shukla, Soham Dutta, ... Pradip Kumar Sadhu in Journal of Electrical Systems and Information Technology
    Article Open access 14 March 2023
  5. Artificial intelligence in the long view: from mechanical intelligence to cyber-social systems

    Artificial intelligence (AI) is emerging as a defining technology of our time, a source of fear as often as inspiration. Immersed in its...

    Bill Cope, Mary Kalantzis in Discover Artificial Intelligence
    Article Open access 09 August 2022
  6. Information Warfare and Cyber Education: Issues and Recommendations

    With the introduction of the Information Warfare (IW) paradigm across military service components, the institution of a new education focus is...
    Conference paper 2021
  7. A Brief Discussion of Winning Mechanism of Intelligentized Warfare

    The rapid development of AI technologies and its integration with traditional technologies have accelerated the intelligentized warfare...
    Shuxin Wang, Yu** Wang, ... Zhong Li in Man-Machine-Environment System Engineering
    Conference paper 2023
  8. Cyber Security Threat, it’s Risks and Susceptibilities, in the Global Perspective

    Cyber threats have become a big problem for the world today and out of many, the most prominent in this respect are social engineering and cyber...
    Radhika Mohan Gupta, Priyanka Mathur, Ruchi Nanda in Rising Threats in Expert Applications and Solutions
    Conference paper 2022
  9. Assessment of Attribution in Cyber Deterrence: A Fuzzy Entropy Approach

    Against the threat of cyber warfare and cyber-attacks involving cyber kinetics by state and non-state elements traditionally various and the kind of...
    T. N. Nisha, Prasenjit Sen in Congress on Intelligent Systems
    Conference paper 2022
  10. Cyber Resilience for SDG Towards the Digitization: An Imperial Study

    With the digitization and evolution of Internet technology, the prevalence of most cyber-attacks is increasing. As society adopts digitalization, the...
    Kousik Barik, Sanjay Misra, ... Sabarathinam Chockalingama in Artificial Intelligence of Things for Achieving Sustainable Development Goals
    Chapter 2024
  11. Cyber Influence Operations

    Influence operations (IO) date from time immemorial as strategic and tactical tools that are used to complement diplomacy. More recently, strategic...
    Chapter 2022
  12. Cyber Operational Planning

    The process of collecting business, software, or information systems’ requirements in general and security requirements in particular can take...
    Chapter 2023
  13. Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation

    As the cyber domain continues to develop, it becomes increasingly crucial to provide cybersecurity workers with state-of-the-art competencies. This...
    Conference paper 2024
  14. Military Cyber Activities in Russia’s War Against Ukraine and Their Significance for the Debates on the Containment of a Cyberwar

    Russia’s invasion of Ukraine and the ensuing war have, among many other security certainties, demonstrated for the first time the role of cyberspace...
    Chapter 2024
  15. Study of the Need for Effective Cyber Security Trainings in India

    With the availability of android phones and internet in every hand, the rate of cyber-crimes have increased tremendously. This increase in...
    Rakesh Kumar Chawla, J. S. Sodhi, Triveni Singh in Data Management, Analytics and Innovation
    Conference paper 2023
  16. Is Cyber Warfare an Alternative?

    The possibility of using computerized means in offensive action against civilian or military installations from enemy countries is a real. Given the...
    Conference paper 2020
  17. Challenges for Cyber Arms Control: A Qualitative Expert Interview Study

    Cyberspace and its ongoing militarization have already been a topic in international fora as well as scientific debates for several years. Many...
    Chapter 2024
  18. Measures of Cyber Performance and Effectiveness

    Cyber and aerial operations are both founded in intelligence collection. World War I (WW I) scout planes provide an analog cyber’s initial use...
    Chapter 2022
  19. An Analysis Study of Security Threats, Vulnerabilities Challenges of Cyber-Physical Systems

    Cyber-Physical Systems (CPS) have the property that can be accessed and managed remotely and it is almost anywhere. Because of these characteristics,...
    Javaid Ahmad Wani, Samayveer Sing, ... Pradeep Kumar Singh in IoT, Big Data and AI for Improving Quality of Everyday Life: Present and Future Challenges
    Chapter 2023
  20. C2 Twin Network and Full Lifecycle Management for Intelligent Warfare

    With the widespread application of artificial intelligence in military fields, intelligent warfare is increasingly becoming the focus of attention....
    Wei-Lin Wang, Jian-Feng Shi, ... Bao-Long Li in Proceedings of 2022 10th China Conference on Command and Control
    Conference paper 2022
Did you find what you were looking for? Share feedback.