Filters








1,056 Hits in 5.0 sec

Transactions on Maritime Science (ToMS) - Volume 4, 2015

:None, Universitätsbibliothek Braunschweig
2015 Transactions on Maritime Science  
., (1989), Adaptive Identification and Control of Dynamical Systems using Neural Networks, Proc. of the 28th Conference on Decision and Control, Tampa, Florida.  ...  Acknowledgments Technical help, critical reviews of the manuscript and financial or other sponsorship may be acknowledged.  ...  Information Systems Security Awareness Computer-Based Training (CBT) on cyber threats in the maritime environment.  ... 
doi:10.24355/dbbs.084-201504210839-0 fatcat:ae5i4lo6cve45oy7fbqd3cfcae

Key terrain in cyberspace: Seeking the high ground

David Raymond, Tom Cross, Gregory Conti, Michael Nowatkowski
2014 2014 6th International Conference On Cyber Conflict (CyCon 2014)  
During a cyber operation, an analysis of key terrain will aid in the strategy and tactics of both the offense and the defense.  ...  key terrain in cyber operations.  ...  Physical Plane  A USB key  A cellular phone  An Ethernet switch  Regional communications cables  ADA Radar/early warning network  Data center for government agency or major industry  ... 
doi:10.1109/cycon.2014.6916409 dblp:conf/cycon/RaymondCCN14 fatcat:6ctm44aebreo7gdycqzlsc7d34

Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?

Michael Stohl
2007 Crime, law and social change  
Over the past two decades there has developed a voluminous literature on the problem of cyber terrorism.  ...  It suggests that at least part of the explanation lies both in the continuing failure to distinguish between what Denning (Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing  ...  Indeed, the risk of operational failure could be a deterrent to terrorists. For now, the truck bomb poses a much greater threat than the logic bomb.  ... 
doi:10.1007/s10611-007-9061-9 fatcat:36kou7ekajf57jryeeuysrnzvm

Cyber warfare and autonomous self-defence

Francis Grimal, Jae Sundaram
2017 Journal on the Use of Force and International Law  
It is now over two decades since Arquilla and Ronfeldt warned about the advent of cyber warfare in the foreseeable future, and cyberspace has now become a primary battlefield.  ...  Prevailing at the forefront of academic scrutiny within the jus ad bellum context is the extent to which cyber operations fall within the paradigm of Article 2(4) of the United Nations Charter.  ...  computer networks'. 142 The above definition can be used as a working model to develop an argument for an automated Cyber Defence Shield (CDS).  ... 
doi:10.1080/20531702.2017.1338877 fatcat:e2wj34ylgbbi3hnkr3b5m5q6e4

Cyberterrorism: The Sum of All Fears?

GABRIEL WEIMANN
2005 Studies in Conflict and Terrorism  
Many of these fears, the report contends, are exaggerated: not a single case of cyberterrorism has yet been recorded, hackers are regularly mistaken for terrorists, and cyberdefenses are more robust than  ...  From a psychological perspective, two of the greatest fears of modern time are combined in the term "cyberterrorism."  ...  His judgment was echoed in Assessing the Risks of Cybertwrrorism, Cyber War, and Other Cyber Threats, a 2002 report for the Center for Strategic and International Studies, written by Jim Lewis, a sixteen-year  ... 
doi:10.1080/10576100590905110 fatcat:srauzhy77fgdlkixmexqk2kcni

Cyber Security amid COVID-19

Hussin J. Hejase, Hasan F. Fayyad-Kazan, Ale J. Hejase, Imad A. Moukadem
2021 Computer and Information Science  
According to VMware cybersecurity strategist Tom Kellermann, quoted in Menn (2020), “There is a digitally historic event occurring in the background of this pandemic, and that is there is a cybercrime  ...  The outcomes serve as an eye opener for security officers in charge of the safety of organizational intellectual properties and stimulates organizations to adopt protection systems and safety practices  ...  Once planners identify the cyber center of gravity (a critical point-a source of power for the adversary's cyber operations), they can target it‖ (p. 72).  ... 
doi:10.5539/cis.v14n2p10 fatcat:gehox2abkrgeldcfxtbiq7ml7q

Analogy and Authority in Cyberterrorism Discourse: An Analysis of Global News Media Coverage

Lee Jarvis, Stuart Macdonald, Andrew Whiting
2016 Global Society  
It begins by arguing that the preoccupation with questions of definition, threat and response in academic literature on cyberterrorism is problematic, for two reasons.  ...  Although there is genuine heterogeneity in representations of cyberterrorism therein, we argue that constructions of this threat rely heavily on two strategies.  ...  Acknowledgements We express our gratitude to Swansea University's College of Law and Criminology, and to  ... 
doi:10.1080/13600826.2016.1158699 fatcat:fxni7z2wlnachgkvql6jyvunwu

A treaty for cyberspace

REX HUGHES
2010 International Affairs  
per cent), according to a security awareness executive, Tom Kellerman.  ...  Kellerman, a member of The Commission on Cyber Security for the th Presidency, served in the World Bank Treasury Security Team for cyber intelligence.  ...  States, for their part, are fully capable of quietly exploiting the skills of hackers or so-called patriotic cyber-warriors.  ... 
doi:10.1111/j.1468-2346.2010.00894.x fatcat:snilbl2abfeerhf2oxguag73ru

Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

Tom Keatinge
2015 ICCT Research Papers  
Functioning as a nucleus within the international counter-terrorism network, ICCT -The Hague endeavours to connect academics, policy-makers and practitioners by providing a platform for productive collaboration  ...  Consequently, avenues to new and innovative solutions are identified, which will reinforce both human rights and security.  ...  Acknowledgements This paper has benefited from the support of a number of organisations and individuals whom I would like to thank.  ... 
doi:10.19165/2015.1.06 fatcat:2zpoli6wu5caldqlncfk6dq54y

Crossing Point of Artificial Intelligence in Cybersecurity

Praveen Kumar Donepudi
2015 American Journal of Trade and Policy  
Then again, AI models will confront different cyber threats, which will affect their sample, learning, and decision making.  ...  And finally, from the aspects of developing encrypted neural networks and understanding safe deep learning, we expand the current analysis on the most proficient method to develop a secure AI framework  ...  ARTIFICIAL INTELLIGENCE IN CYBERSECURITY In the early days, Cyber Security and AI were not associated with one another.  ... 
doi:10.18034/ajtp.v2i3.493 fatcat:7xnhwohhuvhzbetquabg7qtw2e

Cyber-Threats and the Limits of Bureaucratic Control

Susan W. Brenner
2011 Social Science Research Network  
, and (iii) develop a new approach for dealing with cyber-threats.  ...  Weber made in heralding the efficiency of the bureaucratic model of organization. 544 This means that bureaucracy is a suitable organizational model when both operate in real-space. 545 But law enforcement  ...  Because the na- The Cold War civil defense initiative was developed in response to a very different threat environment, and so cannot serve as a template for a cyber-threat control structure that integrates  ... 
doi:10.2139/ssrn.1950725 fatcat:7llesoviabd2lpacp2euhdoecq

Avoiding the internet of insecure industrial things

Lachlan Urquhart, Derek McAuley
2018 Computer Law and Security Review  
This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives.  ...  gap for best practice; and engaging with infrastructural complexity.  ...  -Mining -safety applications like early warning sensing for natural disasters, chemical and biological sensors for worker disease detection underground.  ... 
doi:10.1016/j.clsr.2017.12.004 fatcat:aay53nzg2za4lluc6oynuiylna

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

Amanda N. Craig, Scott J. Shackelford, Janine S. Hiller
2015 American Business Law Journal  
To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations.  ...  We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric "global security assemblages."  ...  to Dmitri Alperovitch, then-vice president of threat research at the anti-virus firm McAfee, Operation Aurora "totally" changed the threat model, representing the first instance in which private firms  ... 
doi:10.1111/ablj.12055 fatcat:5b4p2q5otraflb6jjyxuvfdqju

THE DEPARTMENT OF HOMELAND SECURITY [chapter]

2017 Foundations of Homeland Security  
The Department of Homeland Security would lead the federal government's efforts in preparing for and responding to the full range of terrorist threats involving weapons of mass destruction.  ...  authority over major federal security operations related to our borders, territorial waters, and transportation systems.  ...  Threat Analysis and Warning. Actionable intelligence is essential for preventing acts of terrorism.  ... 
doi:10.1002/9781119289142.ch7 fatcat:miyk2ogpffczdfyih5f7frjpxq

Department of Homeland Security [chapter]

2014 Fire Safety Management Handbook, Third Edition  
The Department of Homeland Security would lead the federal government's efforts in preparing for and responding to the full range of terrorist threats involving weapons of mass destruction.  ...  authority over major federal security operations related to our borders, territorial waters, and transportation systems.  ...  Threat Analysis and Warning. Actionable intelligence is essential for preventing acts of terrorism.  ... 
doi:10.1201/b16480-13 fatcat:zyxt76xh2zehhlv6zfprsr76wu
« Previous Showing results 1 — 15 out of 1,056 results