Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 321 - 330 of 354 references
2022 - - European Union Institute for Security Studies

the increasing importance of dual-use

Dual-use cybersecurity
2022 - Elie Alhajjar, Kevin Lee - Academic Conferences International Ltd

general frame for the cyber threat landscape in US with focusing on 5 main categories: ransomware, social ingeneering, third party software, deep fakes and insider threats.

Cybersecurity and defense
2023 - Oliver A. Guidetti, Craig P. Speelman, Peter Bouhlas - Frontiers Media SA

Vigilance decrement refers to a psychophysiological decline in the capacity to sustain attention to monotonous tasks after prolonged periods. A plethora of experimental tasks exist for researchers to study vigilance decrement in classic domains such as driving and air traffic control and baggage security; however, the only cyber vigilance tasks reported in the research literature exist in the possession of the United States Air Force (USAF). Moreover, existent cyber vigilance tasks have not kept up with advances in real-world cyber security and consequently no longer accurately reflect the cognitive load associated with modern network defense. The Western Australian Cyber Defense Task (WACDT) was designed, engineered, and validated. Elements of network defense command-and-control consoles that influence the trajectory of vigilance can be adjusted within the WACDT. These elements included cognitive load, event rate, signal salience and workload transitions. Two forms of the WACDT were tested. In static trials, each element was adjusted to its maximum level of processing difficulty. In dynamic trials, these elements were set to increase from their minimum to their maximum values. Vigilance performance in static trials was shown to improve over time. In contrast, dynamic WACDT trials were characterized by vigilance performance declines. The WACDT provides the civilian human factors research community with an up-to-date and validated vigilance task for network defense accessible to civilian researchers. Copyright © 2023 Guidetti, Speelman and Bouhlas.

Civilian cybersecurity
2016 - - MITRE

We are in the midst of a digital transformation. Technology connects the world and is changing everything. It changes how organizations deliver goods and services and how people live and work. At the same time, this improved connectivity increases our risks to data confidentiality, availability, integrity, human safety, and infrastructure reliability. Federal civilian organizations increasingly use networked technology to help deliver their missions, which can lead to attacks and disruption. Cyber-attacks often result in mission breaches that damage public trust and national and economic security. As mission executions are more dependent on networked technology, enterprise mission strategy and enterprise cybersecurity strategy must be linked.

Civilian cybersecurity
2020 - Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros - ACM

Smart Grids are energy delivery networks, constituting an evolution of power grids, in which a bidirectional flow between power providers and consumers is established. These flows support the transfer of electricity and information, in order to support automation actions in the context of the energy delivery network. Insofar, many smart grid implementations and implementation proposals have emerged, with varying degrees of feature delivery and sophistication.

Cybersecurity and defense
2020 - Theodoros Mavroeidakos, Vasilis Chaldeakis - Springer International Publishing

This paper sheds new light in the overall definition of the threat landscape that emerges by the convergence of CC and IoT in a SG.

Cybersecurity and defense
2022 - Noman H. Chowdhury, Marc T.P. Adam, Timm Teubner - Elsevier BV

Cybersecurity is a growing concern for private individuals and professional entities. Reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. Research on human cybersecurity (HCS) behavior suggests that time pressure is one of the important driving factors behind non-secure HCS behavior. However, there is limited conceptual work to guide researchers and practitioners in this regard. Against this backdrop, we investigate how the impact of time pressure on HCS behavior can be conceptualized within an integrative framework and which countermeasures can be used to reduce its negative impact. Altogether, we conducted 35 interviews with cybersecurity experts, non-security professionals, and private users.

Civilian cybersecurity
2018 - Ronald J. Deibert - Cambridge University Press (CUP)

A “national security–centric” approach currently dominates cybersecurity policies and practices. Derived from a realist theory of world politics in which states compete with each other for survival and relative advantage, the principal cybersecurity threats are conceived as those affecting sovereign states, such as damage to critical infrastructure within their territorial jurisdictions. As part of a roundtable on “Competing Visions for Cyberspace,” this essay presents an alternative approach to cybersecurity that is derived from the tradition of “human security.”

Civilian cybersecurity
2020 - Shahrin Sadik, Mohiuddin Ahmed, Leslie F. Sikos, A. K. M. Najmul Islam - MDPI AG

This paper focuses on the cybersecurity of smart grids and the emerging trends such as using blockchain in the Internet of Things (IoT). The cybersecurity of emerging technologies such as smart cities is also discussed. In addition, associated solutions based on artificial intelligence and machine learning frameworks to prevent cyber-risks are also discussed. Our review will serve as a reference for policy-makers from the industry, government, and the cybersecurity research community.

Civilian cybersecurity
2022 - Bahaa Eltahawy, Tero Vartiainen, Maria Valliou, Jirapa Kamsamrong, Mike Mekkanen, Andrejs Romanovs - IEEE

The major trends and transformations in energy systems have brought many challenges, and cybersecurity and operational security are among the most important issues to consider. First, due to the criticality of the energy sector. Second, due to the lack of smart girds’ cybersecurity professionals. Previous research has highlighted skill gaps and shortage in cybersecurity training and education in this sector. Accordingly, we proceeded by crafting a roadmap strategy to foster cybersecurity education in smart grids.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.