Skip to main content
Starting from the early 2000s it became clear that classic cyber protection wasn’t enough anymore. Traditional strategies are based on a signature approach where the security system is familiar with the behavior (signature) of the... more
    • by 
    •   4  
      CybersecurityComputer Networking and TelecommunicationCyber SecurityUser Behavior Modeling
The current development of a cyber defence policy by the North Atlantic Treaty Organization (NATO) is usually seen as exemplifying the alliance’s changing scope of intervention; as well as its broadened perception of security. From an... more
    • by 
    •   10  
      CyberlawNATOCyber WarfareCybersecurity
This paper presents the sharing of our experiences and lessons learned to modernize a warship with C6ISR utilizing the digital engineering MBSE models of complex systems. We captured Enterprise Architecture (EA) DoDAF views, KPP and KSA... more
    • by 
    •   6  
      EngineeringComputer EngineeringSystems EngineeringComputer Networks
With growing global political weight and one of the biggest digital markets in the world, India, a leading developing country in the G77, is poised to play a critical role in the WSIS+10 Review. In line with its earlier positions on... more
    • by 
    •   7  
      Information SocietyInternet GovernanceICT4DICT for Development
Cyber crime is emerging as serious threat. To the world of computer technology, governments, police and intelligence units are acting toward the issue closely. Different strategies are put into action. The effort is done to educate people... more
    • by 
    •   3  
      TanzaniaIndiaCybersecurity
The United States military conducts operations on the sea, in the air, and on the land. As the world flattens with the dawn of the cyber age, the United States Navy finds itself on the front lines of the emerging battlefield of... more
    • by 
    •   3  
      Organizational CultureCybersecurityUnited States Navy
First monograph linking ethics and conduct of cyber conflict, including for the first time a description of "state-sponsored hacktivism" as the preferred mode of cyber warfare. Offers the first sustained critique of the Tallinn Manual on... more
    • by 
    •   4  
      Cyber WarfareCyberculturesCybersecurityCyber Law
In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... more
    • by 
    •   11  
      Cyber TerrorismCyber crimeIndiaCybersecurity
At the recently concluded ITU Plenipotentiary Conference in Busan, India proposed a controversial new resolution that sought to contribute to realising a more secure information society. But while some criticisms of the draft resolution... more
    • by 
    •   4  
      Human RightsInternet GovernanceCybersecurityCyber Security
With the arrival of cyberspace, a whole host of new security and other challenges have arisen which are not always adequately tackled. In order to deal with them more appropriately, India has repeatedly argued for a greater role of the UN... more
    • by 
    •   8  
      International RelationsInternational LawUnited NationsIndia
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their... more
    • by 
    •   8  
      Information WarfareSecurity StudiesSociology of RiskRisk Management
Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is... more
    • by 
    •   8  
      Network SecurityRisk and VulnerabilityComputer SecurityVulnerability
This chapter provides a political and philosophical analysis of the values at stake in ensuring cyber-security for critical infrastructures. It presents a review of the boundaries of cybersecurity in nation-al security, with a focus on... more
    • by  and +2
    •   6  
      National IdentityCybersecurityCritical infrastructure protectionCritical Infrastructures
    • by 
    •   6  
      National Security CultureSecuritizationCritical Discourse AnalysisCybersecurity
Proceedings of the INTERNATIONAL CONFERENCE ON
"CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"
    • by 
    •   46  
      HistorySociologySocial PsychologyGeography
The following paper explores the main resolutions of the EU since the break of the millennium regarding Cyber-related issues, estimates whether they have a practical sense or only a declaratory nature, and lays out some observances... more
    • by 
    •   6  
      European HistoryEuropean StudiesCybercrimesEuropean Security and Defence Policy
Experts in cybersecurity principles for satellite and space systems believe that with the stakes so high when it comes to protecting the data that satellites carry, security cannot be an afterthought. It must play an integral part of the... more
    • by 
    •   2  
      CybersecuritySpace Systems
Seminário ao Mestrado em Segurança da Informação e Comunicação, da VSB - Universidade Técnica de Ostrava, República Checa, 30 de abril de 2019.
    • by 
    •   9  
      European LawCybercrimesEuropean Union LawCybersecurity
The WordPress platform is without a doubt the most popular CMS platform on the web. This platform has various features and tools which make it the preferred option for many website owners. Its popularity has captured the imagination of... more
    • by 
    • Cybersecurity
    • by 
    •   98  
      HistoryCultural HistorySociologyPolitical Sociology
Fragile, corrupt and ineffective National Health Systems in authoritarian regimes deserve greater attention by the Intelligence Community.
    • by  and +1
    •   20  
      International RelationsGlobalizationIntelligenceGlobal Governance
    • by 
    •   6  
      CyberlawCyber WarfareCyberspaceCybersecurity
Submission to 2021-2025 UN Open-Ended Working Group (OEWG) on security of and in the use of information and communications technologies. This paper discusses technical attribution and options to make it more transparent and accessible... more
    • by  and +2
    •   5  
      Information TechnologyInternational RelationsGlobal GovernanceUnited Nations
iOS has proven to resist against information hiding techniques. However, Siri, a native service to control iPhone/iPad via voice commands, could change this trend in the near future.
    • by 
    •   12  
      Mobile TechnologyMobile CommunicationMobile application developmentMobile Computing
Presented at the 2018 Florida Cyber Conference, Cyberville demonstrates modern exploits on critical infrastructure (SCADA/ICS) while visually and interactively representing potential disruption on a physical model of the Tampa Bay region.... more
    • by 
    •   4  
      Cyber crimeCybersecurityCyber SecurityCyberspace Operations
‫מאת‬ ‫סיני‬ ‫יובל‬ ‫הקדמה‬ ‫כלכלת‬ ‫של‬ ‫לידתה‬ ‫את‬ ‫השאר‬ ‫בין‬ ‫כלל‬ ‫אשר‬ ‫דבר‬ ‫חדשות,‬ ‫הזדמנויות‬ ‫של‬ ‫כר‬ ‫רבים‬ ‫עבור‬ ‫יצר‬ ‫המידע,‬ ‫עידן‬ ‫של‬ ‫מלאה‬ ‫תלות‬ ‫נוצרה‬ ‫המידע,‬ ‫בעידן‬ ‫הגלומים‬ ‫היתרונות‬ ‫לצד‬ ‫והחדשנות.‬... more
    • by 
    •   17  
      Information TechnologyInformation SecurityHomeland SecurityCyber Conflict
Digitalization is exposing developing countries to a growing number of risks as well as opportunities associated with connecting to the Internet. Myanmar stands out as a critical case of both the pitfalls and the benefits Internet... more
    • by 
    •   8  
      Development StudiesSocial MediaCapacity BuildingGlobal South
In recent years, the growth of brain-computer interfaces (BCIs) has been remarkable in specific application fields, such as the medical sector or the entertainment industry. Most of these fields use evoked potentials, like P300, to obtain... more
    • by 
    •   2  
      CybersecurityBrain Computer Interfaces
Timely sharing of cyber security related information between organizations has long been perceived as an effective measure to address cyber security challenges. Even though information sharing is a cost-effective tool and a crucial step... more
    • by 
    •   3  
      CyberculturesCybersecurityCybersecurity policy
This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a... more
    • by 
    •   5  
      International RelationsIranian StudiesIsraelCyberwarfare
Medical training devices are becoming increasingly dependent on technology creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and... more
    • by 
    •   2  
      CybersecurityVulnerability assessment
About ISACA ® With more than 100,000 constituents in 180 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security,... more
    • by 
    •   2  
      Information SecurityCybersecurity
Intrusion Detection is a topic that is of interest both in the corporate world as well as academia. In the advent of Big Data Analytics, multiple analytics techniques can be used on the enormous amounts of data that is being generated... more
    • by 
    •   3  
      CybersecurityIntrusion DetectionIntrusion Detection Systems (IDSs)
Information Technology has grown rapidly leading to challenges with communicating information with nodes at remote locations. There are many communication media, and certain varieties of wired links such as coaxial cables, where multiple... more
    • by 
    •   5  
      Information SecurityCybersecuritySystem Analysis and DesignData Security
The purpose of this study was to examine pedagogical best practices for student mastery of cybersecurity competencies. Additionally, the researcher explored factors that may either promote or hinder student learning in cybersecurity... more
    • by 
    • Cybersecurity
Data Theft is a rampant crime in India. Employees steal data as it is there gratuity. As per The IT Act,2000 Data Theft is a cyber crime in India and attracts criminal as well as civil remedies. This articles discusses the law provisions... more
    • by 
    •   15  
      PrivacyPERSONAL DATA PROTECTIONCyber crimeThe Internet
Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the next global superpowers [1],... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyCyberspaceCybersecurity
    • by 
    •   3  
      European StudiesEuropean UnionCybersecurity
    • by 
    •   6  
      Information SecurityCyber TerrorismInformation operations (IO)Cybersecurity
We are living in the age of globally connected information systems. Very few networks remain isolated because of the need to reach consumers or pass information around the world. Banks, social networking companies, and retailers are all... more
    • by 
    • Cybersecurity
La ciberseguridad es un problema a hacer frente por los despachos de abogados, grandes y pequeños y en esta profesión lo estamos abordando realmente mal. Es difícil luchar contra algo que no se ve y poca gente entiende, sobre todo cuando... more
    • by 
    •   4  
      CybersecurityCybersecurity LawCybersecurity policyCiberseguridad
    • by 
    •   8  
      EngineeringCyber WarfareCybersecurityNational Security
Presentation of the German IT-Security Law IT-SiG 2.0 draft version 2019 in English
    • by 
    •   3  
      International LawCybersecurityGermany
The requirement for a collaborative effort to achieve a common set of security standards for use by entities that process, store or transport voter data. -More than 350,000 voting machines are used in the Unites States today in over 42... more
    • by 
    •   22  
      European StudiesRussian StudiesArtificial IntelligenceCybercrimes
Amidst an explosion in digital health product investment, increasingly frequent cybersecurity vulnerabilities, and a scattered regulatory framework, the digital health marketplace requires a clear, measured approach to consumer safety and... more
    • by 
    •   9  
      Information SecurityPublic Health LawPrivacyHealth Law
The book faces an essential contemporary issue: the definition of the limits of action, protection and use of cyberspace as a fifth operational domain, as well as in the measures to be taken to make this environment more secure. Using the... more
    • by 
    •   4  
      CyberspaceCybersecurityCyber ThreatsDefense and Strategic Studies
Smart homes and healthcare have increasingly grown more popular in the recent years. Due to the amount of data, it records the need for a more secure method is needed to ensure security and privacy. Consequently, these methods can also... more
    • by 
    •   4  
      CybersecurityHelathSmarthomeBlockchains
Malware, also referred to as the distribution of a malicious code present relentless opposition to cybersecurity. In this generation, identifying malware in systems is becoming a war seemingly with no end since the malware is ever... more
    • by 
    •   4  
      Malware AnalysisCybersecurityComputer Forensics for Cyberspace CrimesCybercrime Monitoring
    • by 
    •   12  
      Computer ScienceComputer SecurityAIAdvanced Computing
The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with... more
    • by 
    •   20  
      BusinessAfrican StudiesComputer SciencePublic Administration