Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 211 - 220 of 354 references
2019 - Christian Reuter, Larissa Aldehoff, Thea Riebe, Marc-André Kaufhold - Springer Fachmedien Wiesbaden

Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research.

Dual-use cybersecurity
2021 - - jrc

This taxonomy is intended to align the cybersecurity terminologies, definitions, and domains to facilitate the categorisation of EU cybersecurity competencies. It provides a four-dimensional approach, including cybersecurity domains, sectors, technologies and use cases to categorize existing EU cybersecurity competence centres (e.g., research organisations or academic institutions) according to their cybersecurity expertise.

Civilian cybersecurity
2020 - - JRC

This report presents the results of a horizon scanning exercise, carried out by the Joint Research Centre (JRC), aiming to identify ‘emerging’ issues displaying potential for dual-use research and further applications, namely the use of civilian research outcomes for defence purposes and vice versa.

Dual-use cybersecurity
2022 - Khandakar Ashrafi Akbar, Latifur Khan, Sadaf Md Halim, Yibo Hu, Bhavani Thuraisingham, Anoop Singhal - Springer International Publishing

In this work, we are motivated to aid the security analyst by introducing a tool which will help to produce a swift and effective response to incoming threats. If an analyst identifies the nature of an incoming attack, our system can produce a ranked list of solutions for the analyst to quickly try out, saving both effort and time.

Civilian cybersecurity
2018 - Erin D. Dumbacher - Informa UK Limited

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation.

Dual-use cybersecurity
2020 - - MILITARY ACADEMY OF LITHUANIA

The edited volume is unprecedented in the scope of topics as well as the size in the context of Lithuanian research regarding international relations and security. Though at first glance the topics might seem distant from one another, the structure of the edited volume has a reasoned approach. The volume starts from the chapters that analyse the core processes in the international system, then moves to the analysis of the main processes in the ideological field. Material and ideological elements define dynamic changes in the international order as well as domestic policies of the states, together with their bilateral and multilateral relations

Cybersecurity and defense
2020 - Dipankar Dasgupta, Zahid Akhtar, Sajib Sen - SAGE Publications

we provide a comprehensive survey of the works that have been carried
out most recently (from 2013 to 2018) on ML in cybersecurity, describing the basics of cyber-attacks and corresponding
defenses, the basics of the most commonly used ML algorithms, and proposed ML and data mining schemes for cybersecurity in terms of features, dimensionality reduction, and classification/detection techniques. In this context, this article
also provides an overview of adversarial ML, including the security characteristics of deep learning methods. Finally, open
issues and challenges in cybersecurity are highlighted and potential future research directions are discussed.

Cybersecurity and defense
2024 - Ugochukwu Ikechukwu Okoli, Temitayo Oluwaseun Abrahams, Ogugua Chimezie Obi, Adebunmi Okechukwu Adewusi - GSC Online Press

This paper examines the significance of ML in the field of cybersecurity, with a special emphasis on the identification of threats and the implementation of protective measures. By incorporating ML algorithms into cybersecurity frameworks, organisations may automate decision-making processes, facilitating prompt responses to ever-changing threats. Lastly, the paper covers the obstacles and ethical issues related to the adoption of ML in cybersecurity. Issues like as adversarial assaults, skewed datasets, and the interpretability of ML models are examined, highlighting the necessity for a holistic strategy that integrates modern technology with ethical considerations.

Civilian cybersecurity
2021 - Agustín Salas-Fernández, Broderick Crawford, Ricardo Soto, Sanjay Misra - Springer International Publishing

This study aims to investigate the metaheuristics applied to optimize artificial intelligence techniques in the detection of threats or optimization of attacks by using specific measures: detection or attack technique, purpose and the type of metahauristics involved.

Cybersecurity and defense
2021 - Vitalii Susukailo, Ivan Opirsky, Oleh Yaremko - Springer International Publishing

The chapter addresses the Information Security Management System (ISMS) establishment approach, ensuring necessary controls to avoid widespread cybersecurity threats nowadays. The most common attack vectors and techniques of the last three years were analyzed in this chapter to define a set of information security practices, which can minimize risks related to modern cybersecurity threats.

Cybersecurity and defense
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.