Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear centrifuges, air defense systems, and electrical grids, cyber-attacks pose a serious threat to national security. As a result, some have... more
    • by 
    •   6  
      Political ScienceCyber WarfareWarUnited States
British Airways will face record-breaking GDPR fine for suffering financial data theft of hundreds of thousands of customers. Following an extensive investigation, the UK's data privacy authority announced that it intends to impose its... more
    • by 
    •   10  
      PERSONAL DATA PROTECTIONInformation Security and PrivacyPrivacy and data protectionData Security
The requirement for a collaborative effort to achieve a common set of security standards for use by entities that process, store or transport voter data. -More than 350,000 voting machines are used in the Unites States today in over 42... more
    • by 
    •   23  
      European StudiesRussian StudiesArtificial IntelligenceCybercrimes
In recent years, NATO and the EU have taken greater responsibility for countering hybrid threats. This group of threats covers a wide range of hostile methods used by states and non-state actors. It includes both military and non-military... more
    • by 
    •   8  
      NATOEuropean UnionCyber SecurityDisinformation
    • by 
    •   4  
      Network SecurityIEEECyber SecurityCyber Attack
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals... more
    • by 
    •   6  
      Political ScienceComputer SecurityCyberspaceCyberwarfare
In this article, we will discuss keylogger attacks with xss.
    • by 
    •   18  
      Information SecuritySecurity in Web ServicesMalwareWeb Application Security
The Russia-China deal on cyber-security could send a warning signal to the U.S., which might view the deal as a growing threat to its economic and security interests in cyberspace.
    • by 
    •   5  
      Information SecurityCyber crimeCyber SecurityCyber Attack
    • by 
    •   7  
      Information SecurityComputer SecurityAsymmetryCyber Attack
A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by... more
    • by 
    • Cyber Attack
Cyber attack is an action that aims to harm someone’s computer and system, or to steal valuable information. Despite the complexity of systems and the security measures organizations deploy, satellites systems are vulnerable to malicious... more
    • by 
    •   3  
      Network SecurityCyber AttackSattelite Communication
With the growing internet services, cybersecurity becomes one of the major research problems of the modern digital era. Cybersecurity involves techniques to protect and control the systems, hardware, software, network, and electronic data... more
    • by 
    •   3  
      Network SecurityCyber SecurityCyber Attack
The act of cyber stealing your right of privacy as an individual is growing every day. Cyber Espionage is emerging along with the expansion of the World Wide Web, which origins a gigantic impact either on heavy solid economic, politic,... more
    • by 
    •   4  
      Cyber crimeCyber SecurityDigital PrivacyCyber Attack
Applications of artificial intelligence in cyber warfare have been mainly postulated and studied in the context of defensive operations. This paper provides an introductory overview of the use of autonomous agents in offensive cyber... more
    • by 
    •   14  
      Computer ScienceArtificial IntelligenceLawInternational Law
    • by 
    •   2  
      Cyber SecurityCyber Attack
Cyber-attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber-attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber-attacks that can... more
    • by 
    •   15  
      Cyber-Physical SystemsCyber ConflictCyber WarfareStuxnet
This paper gives the introduction of cyber-attacks, their types, motives and consequences. But the main aim of this paper is to provide the insight of some of the major cyber-attacks that took place all over the world and their effects.... more
    • by 
    •   4  
      HackersCyber SecurityCyber AttackDoS attacks
Günümüzde enerji, doğalgaz, ulaşım, sağlık, bankacılık nükleer ve iletişim gibi birçok kritik altyapımızın yönetilmesinde önemli bir yeri olan Endüstriyel Kontrol Sistemleri (EKS) uzun yıllardır siber korsanlar tarafından hedef... more
    • by 
    •   9  
      SCADACyber SecurityCritical InfrastructuresScada Security
    • by 
    •   7  
      Computer ScienceComputer SecurityCritical infrastructure protectionCyber Security
In the present era of technology, cybercriminals are getting smarter day by day. From the past few years, the cybercrimes have increased to an extent that most of the big companies are finding it difficult to prevent cybercrimes. One such... more
    • by 
    •   5  
      Computer NetworksLogistic RegressionRandom ForestPhishing
    • by 
    •   8  
      Computer ScienceArtificial IntelligenceMachine LearningIntelligent Systems
Abstract Cybersecurity in the maritime realm made headlines in 2017 following the spread of ransomware, a type of computer and network virus, in the systems of major shipping companies and providers. Whilst there is extensive literature... more
    • by 
    •   10  
      International LawInternational Criminal LawMaritime LawMaritime Security
we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will... more
    • by  and +2
    •   19  
      CyberlawCyberpsychologyCybercrimesCybernetics
As the digital era matures, cyber security evolves and software vulnerabilities diminish, people however, as individuals, are more exposed today than ever before. Presently, one of the most practised and effective penetration attacks are... more
    • by  and +2
    •   6  
      Network SecurityHackingSocial EngineeringCyber Security
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could prevent nations from protecting themselves from threats, cause substantial economic harm, and even result in the loss of life. Therefore,... more
    • by 
    •   6  
      Critical infrastructure protectionCyber SecurityCyber Attack AttributionCybersecurity Law
"L'accélération fulgurante des cyberattaques contre les infrastructures électriques est aujourd'hui une réalité préoccupante qui nécessite de prendre des mesures d'urgence pour se protéger. Et cela d'autant plus, lorsque leurs... more
    • by 
    •   7  
      CyberwarfareHackingCyber SecurityCyber Attack
A smart grid system supports intelligent metering and monitoring functions spanning the areas of power generation, transmission and distribution. It has enormous benefits for meeting the energy demands and billing requirements through... more
    • by 
    •   3  
      Smart GridCyber SecurityCyber Attack
With the increased dependence of organizations on technological solutions, the cyber threats have become some of the major concerns for the very existence of the businesses. Thus, the security measures to be implemented need to go beyond... more
    • by 
    •   45  
      Information SystemsComputer ScienceComputer Security And ReliabilityInformation Science
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
    • by 
    •   13  
      Risk and VulnerabilityComputer SecurityCyber crimeSocial Networking Security and Privacy
Abstract — Over the past few years, we have witnessed an ever-increasing rampant battle between network managers & computer criminals which led to many developments in the tools used by both parties i.e. " legitimate computer... more
    • by 
    •   18  
      Information SystemsComputer ScienceHuman Computer InteractionInformation Technology
Abstract—Growing in cyber attacks has driven a growth in demand for network security. Cryptology is the science of secret communication systems including cryptography and cryptanalysis. Different heuristic and meta heuristic algorithms... more
    • by 
    •   13  
      SociologyComputer ScienceNetwork SecurityGenetic Algorithms
Book review: VENTRE, Daniel (eds.); "Cyber Conflict: Competing National Perspectives"; ISTE Ltd. and John Wiley & Sons, Inc.; UK & USA; 2012. ISBN: 978-1-84821-350-0.
    • by 
    •   3  
      SociologyCyberwarCyber Attack
With the growing internet services, cybersecurity becomes one of the major research problems of the modern digital era. Cybersecurity involves techniques to protect and control the systems, hardware, software, network, and electronic data... more
    • by 
    •   3  
      Network SecurityCyber SecurityCyber Attack
Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems,... more
    • by 
    •   8  
      Machine LearningGenetic AlgorithmsDeep LearningCyber Security
Özet: Dijital dünya olarak adlandırılan günümüz dünyasında, artık insanoğlu teknolojiksiz bir hayatı düşünememektedir. İnsan, çoğunlukla geçmişine ya da alışkanlıklarına sıkı sıkıya bağlı olduğu için yeni fikirleri ve önemli icatları... more
    • by 
    •   6  
      CybercrimesCybersecurityCyber SecurityCyber Attack Attribution
In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's... more
    • by 
    •   9  
      EngineeringInformation SecurityMultivariate AnalysisIntrusion Detection
Cyber attacks have become a grave threat to international peace and security. Northeast Asia is a critical point of many of these cyber operations. First, South Korea has been the target of cyber attacks from North Korea. Second, there... more
    • by 
    •   3  
      International LawPolitical ScienceCyber Attack
Rusya Federasyonu (RF), siber uzay olarak adlandırılan alanda etkinliğini her geçen gün artırmaktadır. RF’nin siber uzaydaki etkinliğini artırmasının temel sebebi ise uluslararası sistemdeki en önemli siber güçlerden biri konumuna... more
    • by 
    •   5  
      Foreign Policy AnalysisRussiaCyber SecurityCyber Space
China cyberattack has become aggressive, disruptive, stealthy, and sophisticated. Apparently, China’s advantage is more on the cognitive domain than technical domain since information systems security is art and science—in some case, it... more
    • by 
    •   5  
      Information WarfareChinaCyber AttackAnalytic
The social distancing practices triggered by the COVID-19 pandemic have caused a huge growth in the use of online technologies to support remote work, resulting in a sharp rise in computer crimes, privacy breaches and service disruptions... more
    • by  and +1
    •   6  
      Information SecurityComputer SecurityData SecurityCyber Security
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or unauthorized... more
    • by 
    •   6  
      Artificial IntelligenceMachine LearningIntelligent SystemsData Science
يعد العالم حالياً على أعتاب مرحلة جديدة من الهجمات الإلكترونية، أكثر تعقيداً وسرعة وخطورة، تعجز الدول منفردة عن مواجهتها، فهي تنتشر في ثوان معدودة، وتصيب كافة القطاعات والمستويات، وتسبب في ضرب الاقتصاديات والجيوش والأفراد، تدمر البنى... more
    • by 
    •   3  
      Cyber WarfareCyber SecurityCyber Attack
    • by 
    •   12  
      SociologyEconomicsTechnologyComputer Security
A number of catastrophes could block the sun, including asteroid/comet impact, super volcanic eruption, and nuclear war with the burning of cities (nuclear winter). The problem of feeding 7 billion people would arise (the food problem is... more
    • by  and +1
    •   32  
      Agricultural EngineeringDisaster StudiesDisaster risk managementRisk and Vulnerability
Working in Cyberspace Operations from multiple aspects has led me to question the multiple methods and frameworks used to defend enterprises. This has also led to an effort of integrating military operational frameworks where focuses... more
    • by 
    •   33  
      European StudiesRussian StudiesDemocracy and Cyber-Democracy Theory and PracticeGovernment
A smart grid system supports intelligent metering and monitoring functions spanning the areas of power generation, transmission and distribution. It has enormous benefits for meeting the energy demands and billing requirements through... more
    • by  and +1
    •   3  
      Smart GridCyber SecurityCyber Attack
The Cyber risk landscape is developing rapidly in multitude areas. Report to cyber attacks dominates the headlines. It is seemingly becoming more frequent and more sophisticated than ever. Businesses across the wide spectrum of industries... more
    • by 
    •   6  
      Cyber InsuranceCyber AttackCyber RiskIjcet Iaeme
"Lorsque l’on évoque l’affaire « Pegasus », beaucoup l’associent immédiatement à la surveillance globale par les États de nos faits et gestes, aux actions d’espionnage adverse, mais également au non-respect de la législation en vigueur... more
    • by 
    •   13  
      GeopoliticsEuropean UnionCyber crimeGeopolitcs and Geostrategy
Cyber Attack adalah jenis manuver ofensif yang digunakan oleh negara, individu, kelompok, masyarakat atau organisasi yang menargetkan sistem informasi komputer, infrastruktur, jaringan komputer, atau perangkat komputer pribadi dengan... more
    • by 
    •   3  
      Cyber SecurityCyber communicationCyber Attack
Cyberinterventions such as attacks and exploits can severely affect critical infrastructures and people's everyday activities. In this context, we must understand the dimensions and scope of cyberattacks and assess measures to enhance... more
    • by  and +1
    •   7  
      CybercrimesCyberspaceCybersecurityCyber Security