Works matching DE "CYBERTERRORISM"
Results: 5000
The role of insurers in shaping international cyber-security norms about cyber-war.
- Published in:
- Contemporary Security Policy, 2024, v. 45, n. 1, p. 141, doi. 10.1080/13523260.2023.2279033
- By:
- Publication type:
- Article
Career connections: transnational expert networks and multilateral cybercrime negotiations.
- Published in:
- Contemporary Security Policy, 2024, v. 45, n. 1, p. 45, doi. 10.1080/13523260.2023.2274775
- By:
- Publication type:
- Article
Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia, and India.
- Published in:
- Contemporary Security Policy, 2024, v. 45, n. 1, p. 72, doi. 10.1080/13523260.2023.2266906
- By:
- Publication type:
- Article
'Cyber-rattling: can 'pre-positioning' in cyberspace amount to a threat of the use of force under Article 2(4) of the United Nations Charter?
- Published in:
- Journal on the Use of Force & International Law, 2024, v. 11, n. 1/2, p. 50, doi. 10.1080/20531702.2024.2413791
- By:
- Publication type:
- Article
From code to command: Unveiling India's cyberpower strategy.
- Published in:
- Comparative Strategy, 2024, v. 43, n. 3, p. 223, doi. 10.1080/01495933.2024.2340951
- By:
- Publication type:
- Article
Cyber and quantum threats to space systems – A study of the restructuring of a modern armed forces.
- Published in:
- Comparative Strategy, 2024, v. 43, n. 3, p. 206, doi. 10.1080/01495933.2024.2340949
- By:
- Publication type:
- Article
Cyber intelligence: Actors, policies, and practices: Edited by Constance S. Uthoff, Boulder, CO: Lynne Rienner, 2022, $45.00, 441 pp., ISBN: 1626379661.
- Published in:
- 2024
- By:
- Publication type:
- Product Review
Cybersecurity and Libraries.
- Published in:
- Technical Services Quarterly, 2024, v. 41, n. 1, p. 82, doi. 10.1080/07317131.2023.2300530
- By:
- Publication type:
- Article
The evolution of EU–US cybersecurity law and policy: on drivers of convergence.
- Published in:
- Journal of European Integration, 2024, v. 46, n. 7, p. 1073, doi. 10.1080/07036337.2024.2411240
- By:
- Publication type:
- Article
Drone Activity and Cyber Terrorism.
- Published in:
- 2024
- By:
- Publication type:
- Book Review
Assessing Racial and Ethnically Motivated Extremist Cyberattacks Using Open Source Data.
- Published in:
- Terrorism & Political Violence, 2024, v. 36, n. 1, p. 113, doi. 10.1080/09546553.2022.2119848
- By:
- Publication type:
- Article
The FBI's Border Coverage (BOCOV) Program and the Ambiguity of Intelligence Missions.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2024, v. 37, n. 1, p. 331, doi. 10.1080/08850607.2023.2221825
- By:
- Publication type:
- Article
Artificial Intelligence and Cross-Domain Warfare: Balance of Power and Unintended Escalation.
- Published in:
- Global Society: Journal of Interdisciplinary International Relations, 2024, v. 38, n. 1, p. 34, doi. 10.1080/13600826.2023.2248179
- By:
- Publication type:
- Article
Towards an evaluation framework for medical device-integrated electronic medical record.
- Published in:
- 2024
- By:
- Publication type:
- Literature Review
Information sharing and security investment for substitutable firms: A game-theoretic analysis.
- Published in:
- Journal of the Operational Research Society, 2024, v. 75, n. 4, p. 799, doi. 10.1080/01605682.2023.2210594
- By:
- Publication type:
- Article
Improved conceptualising of hybrid interference below the threshold of armed conflict.
- Published in:
- European Security, 2024, v. 33, n. 2, p. 169, doi. 10.1080/09662839.2023.2267478
- By:
- Publication type:
- Article
Attack Model for Generic Intelligent Systems.
- Published in:
- Journal of Applied Security Research, 2025, v. 20, n. 1, p. 24, doi. 10.1080/19361610.2023.2283666
- By:
- Publication type:
- Article
Effects of trust in government, counterterrorism policies, and counterterrorism laws on fear of cyberterrorism and fear of terrorism.
- Published in:
- Journal of Policing Intelligence & Counter Terrorism, 2025, v. 20, n. 1, p. 83, doi. 10.1080/18335330.2024.2385897
- By:
- Publication type:
- Article
Stranger than Fiction: The Interview and U.S. Regime-Change Policy Toward North Korea.
- Published in:
- Asia-Pacific Journal: Japan Focus, 2014, v. 12, n. 52, p. 3, doi. 10.1017/s1557466014028332
- By:
- Publication type:
- Article
Autonomous Attack Mitigation Through Firewall Reconfiguration.
- Published in:
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2307
- By:
- Publication type:
- Article
A Unified Cyber Response for Water Utilities: The Cyber Fortress Exercise.
- Published in:
- Journal: American Water Works Association, 2025, v. 117, n. 2, p. 6, doi. 10.1002/awwa.2399
- By:
- Publication type:
- Article
TabNet‐SFO: An Intrusion Detection Model for Smart Water Management in Smart Cities.
- Published in:
- International Journal of Intelligent Systems, 2025, v. 2025, n. 1, p. 1, doi. 10.1155/int/6281847
- By:
- Publication type:
- Article
CYBER THREATS IN THE EUROPEAN SPACE. SECURITY MEASURES AT THE LEVEL OF THE EUROPEAN UNION.
- Published in:
- Bulletin of the Transilvania University of Brasov, Series VII: Social Sciences & Law, 2024, v. 17(66), p. 79, doi. 10.31926/but.ssl.2024.17.66.3.9
- By:
- Publication type:
- Article
Enhancing Cybersecurity Attack Detection Using Multiplayer Battle Game Optimizer with Hybridization of Deep Learning Models.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 115, doi. 10.54216/JCIM.150210
- By:
- Publication type:
- Article
Enhancing DNP3 Security Using CNN Deep Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 225, doi. 10.54216/JCIM.150217
- By:
- Publication type:
- Article
Smart Grid intrusion detection system based on AI techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 195, doi. 10.54216/JCIM.150215
- By:
- Publication type:
- Article
EfficientDense-ViT: APT Detection via Hybrid Deep Learning Framework with Hybrid Dipper Throated Sine Cosine Optimization Algorithm (HDT-SCO).
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 147, doi. 10.54216/JCIM.150212
- By:
- Publication type:
- Article
Enhancing Malware Detection through Electromagnetic Side-Channel Analysis Using Random Forest Classifier.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 233, doi. 10.54216/JCIM.150218
- By:
- Publication type:
- Article
CYBERSECURITY AND LEGAL OBSCURITY: HOW HEALTHCARE ORGANIZATIONS NAVIGATE LEGAL LIABILITY AND INSURANCE COVERAGE IN THE WAKE OF A CYBERATTACK.
- Published in:
- Quinnipiac Health Law Journal, 2024, v. 27, n. 2, p. 191
- By:
- Publication type:
- Article
REINTERPRETING THE LEGALITY OF FORCIBLE SELFDEFENCE IN RESPONSE TO NON-KINETIC CYBER ATTACKS.
- Published in:
- Melbourne Journal of International Law, 2024, v. 25, n. 1, p. 51
- By:
- Publication type:
- Article
Impact of Socio-Economic Factors on Digital Literacy and Security.
- Published in:
- TEM Journal, 2025, v. 14, n. 1, p. 925, doi. 10.18421/TEM141-81
- By:
- Publication type:
- Article
Towards Secure Information Systems: Developing and Implementing an Information Security Evaluation Model Using NIST CSF and COBIT 2019.
- Published in:
- TEM Journal, 2025, v. 14, n. 1, p. 182, doi. 10.18421/TEM141-17
- By:
- Publication type:
- Article
Enhancing Old Age: Smart and Welfare Technologies Use Among Older Adults.
- Published in:
- TEM Journal, 2025, v. 14, n. 1, p. 139, doi. 10.18421/TEM141-13
- By:
- Publication type:
- Article
TRENDY V OBLASTI DIGITALIZÁCIE MALÝCH A STREDNÝCH PODNIKOV SO ZAMERANÍM NA E-SHOPY.
- Published in:
- Social & Economic Revue, 2024, v. 22, n. 2, p. 77, doi. 10.52665/ser20240208
- By:
- Publication type:
- Article
Hybrid Security in the Post-Modern Era: Challenges and Responses in International Relations.
- Published in:
- Acta Universitatis Danubius. Relationes Internationales, 2024, v. 17, n. 2, p. 97
- By:
- Publication type:
- Article
ҚАЗАҚСТАН РЕСПУБЛИКАСЫНДАҒЫ КИБЕРШАБУЫЛДАРДЫ ЖІКТЕУ ЖӘНЕ ҚҰҚЫҚТЫҚ РЕТТЕУ ҚАҒИДАТТАРЫ
- Published in:
- Journal of Actual Problems of Jurisprudence / Habaršy. Zan̦ Seriâsy, 2024, v. 112, n. 4, p. 121, doi. 10.26577/JAPJ2024.112.i4.a12
- By:
- Publication type:
- Article
Event-driven fuzzy L∞ control of DC microgrids under cyber attacks and quantization.
- Published in:
- Transactions of the Institute of Measurement & Control, 2025, v. 47, n. 6, p. 1126, doi. 10.1177/01423312241265781
- By:
- Publication type:
- Article
Enhancing Malware Detection Resilience: A U-Net GAN Denoising Framework for Image-Based Classification.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 3, p. 4263, doi. 10.32604/cmc.2025.062439
- By:
- Publication type:
- Article
An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 3, p. 4535, doi. 10.32604/cmc.2025.060935
- By:
- Publication type:
- Article
Bonne Chance! France Wants to Remain a Military Power.
- Published in:
- International Policy Digest, 2025, p. 2
- By:
- Publication type:
- Article
A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT).
- Published in:
- Expert Systems, 2025, v. 42, n. 2, p. 1, doi. 10.1111/exsy.13726
- By:
- Publication type:
- Article
TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments.
- Published in:
- Expert Systems, 2025, v. 42, n. 2, p. 1, doi. 10.1111/exsy.13684
- By:
- Publication type:
- Article
Investigating Undergraduate Students Levels of Cybercrime Awareness: A Study of Northwest University Sokoto, Sokoto State, Nigeria.
- Published in:
- International Journal of Social Sciences & Educational Studies, 2024, v. 12, n. 1, p. 19, doi. 10.23918/ijsses.v12i1p19
- By:
- Publication type:
- Article
Unraveling the Role of Cyber Insurance in Fortifying Organizational Cybersecurity.
- Published in:
- MIS Quarterly Executive, 2025, v. 24, n. 1, p. 35
- By:
- Publication type:
- Article
LEGISLATIVE DEVELOPMENTS OF CYBERSECURITY INCIDENTS IN JORDAN: A CRITICAL ANALYTICAL STUDY UNTIL 2024.
- Published in:
- Brazilian Journal of Law & International Relations / Relações Internacionais no Mundo, 2024, v. 4, n. 46, p. 688
- By:
- Publication type:
- Article
AI-Driven Transformer Frameworks for Real-Time Anomaly Detection in Network Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 1121, doi. 10.14569/ijacsa.2025.01602111
- By:
- Publication type:
- Article
Enhanced Cyber Threat Detection System Leveraging Machine Learning Using Data Augmentation.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 218, doi. 10.14569/ijacsa.2025.0160223
- By:
- Publication type:
- Article
TYPES OF CYBERATTACKS TARGETING HR COMPANIES.
- Published in:
- Journal of Marine Technology & Environment, 2025, v. 1, p. 17, doi. 10.53464/JMTE.01.2025.02
- By:
- Publication type:
- Article
Security Analysis of Electrical Vehicle Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2025, v. 19, n. 2, p. 572, doi. 10.3837/tiis.2025.02.011
- By:
- Publication type:
- Article
Mitigating Adversarial Reconnaissance in IoT Anomaly Detection Systems: A Moving Target Defense Approach based on Reinforcement Learning.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2024, v. 10, p. 1, doi. 10.4108/eetiot.6574
- By:
- Publication type:
- Article