Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 331 - 340 of 354 references
2020 - Sagar Samtani, Murat Kantarcioglu, Hsinchun Chen - Association for Computing Machinery (ACM)

In this article, we aim to provide an important step to progress the AI for Cybersecurity discipline. We first provide an overview of prevailing cybersecurity data, summarize extant AI for Cybersecurity application areas, and identify key limitations in the prevailing landscape. Based on these key issues, we offer a multi-disciplinary AI for Cybersecurity roadmap that centers on major themes such as cybersecurity applications and data, advanced AI methodologies for cybersecurity, and AI-enabled decision making. To help scholars and practitioners make significant headway in tackling these grand AI for Cybersecurity issues, we summarize promising funding mechanisms from the National Science Foundation (NSF) that can support long-term, systematic research programs. We conclude this article with an introduction of the articles included in this special issue.

Cybersecurity and defense
2016 - - The Cyber Defense Review

This article addresses the role that US service academies play in developing not only future cyber forces, but also a pipeline of qualified cyber-strategic military leaders, who have the knowledge necessary to confront a wide array of cyber threats and establish both a competitive and security advantage in the modern battlespace. In the future, every military leader must be a cyber-strategic leader. In particular, this study surveys current efforts by the US Coast Guard Academy, the US Air Force Academy, the US Military Academy, and the US Naval Academy to prepare all their future officers for the challenges of operational– and strategic–level leadership in an age of persistent cyber threat.

Civilian cybersecurity
2022 - Ying Qu, Fei Guo, Chiranjibe Jana - Wiley

Given the enterprise technology corporation technological learning problem of challenging to reduce the efficiency of technology transfer based on evolutionary game theory, from the nature of technical knowledge, military field, and civilian field of technology spillover, recessive and technical complexity, and other technical features, construction of bounded rationality under the condition of the private enterprise, the enterprise, and the government's three evolutionary game models, the influence of different technical characteristics on the three parties is analyzed by Matlab numerical simulation.

Civilian cybersecurity
2024 - Mohammed Mynuddin, Sultan Uddin Khan, Reza Ahmari, Luis Landivar, Mahmoud Nabil Mahmoud, Abdollah Homaifar - Institute of Electrical and Electronics Engineers (IEEE)

As unmanned aerial vehicles (UAVs) become increasingly integrated across various domains, both military and civilian, safeguarding the security of their navigation systems becomes paramount. In the contemporary age, the prominence of cybersecurity for UAVs has grown due to a rising number of cyberattacks on these systems. Notably, over the past decade, several significant cybersecurity breaches have impacted UAVs due to inadequate vulnerability assessments and security measures. Deep learning (DL)-based algorithms show immense potential for enabling autonomous UAV navigation. However, these algorithms are susceptible to malicious attacks, such as DL-based Trojan attacks, which can compromise the integrity and reliability of UAV navigation systems. This paper addresses potential vulnerabilities in DL-based UAV navigation systems and emphasizes the importance of securing these systems against DL-based Trojan attacks. We design various trigger patterns for collision and steering angle of the DroNet model incorporating adversarial inputs to test the robustness of the deep learning algorithm used for UAV navigation. By simulating potential attacks and studying their effects, we aim to highlight the weaknesses and potential entry points for malicious interference. We assess the effectiveness of Trojan attacks on the DroNet model using poisoned collision and steering angle datasets. Subsequently, we regulate the intensity of the designed triggers and evaluate the performance of the DroNet architecture. Additionally, we propose mitigation strategies to enhance the robustness and security of navigation systems against these attacks. To identify the likelihood of the trained model being trojaned or not, we have developed a Trojan detector and created distinct DroNet Trojan Model Datasets for this purpose. That the DroNet model is vulnerable to DL-based Trojan attacks, as evidenced by the successful manipulation of collision and steering angle predictions. The Trojan detector effectively identifies potential compromises within the model, highlighting the necessity for enhanced security measures. © 2024 The Authors.

Dual-use cybersecurity
2022 - Thea Riebe, Christian Reuter, Philipp Kühn, Philipp Imperatori - Springer Science and Business Media LLC

In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today.

Dual-use cybersecurity
2024 - - United nations

This report collects best practices, challenges, and opportunities for strengthening PPPs on cybercrime. To gather insights from the multistakeholder community, expert interviews and surveys focused on organizations’ knowledge of and experience with national and regional public-private collaboration to
prevent and fight cybercrime.

Civilian cybersecurity
2021 - Yuxiang Hong, Steven Furnell - Elsevier BV

While the Internet has become an indispensable aspect of personal and professional lives, it has also served to render many individuals vulnerable to cybersecurity threats. Thus, the promotion of cybersecurity behaviors can effectively protect individuals from these threats. However, cybersecurity behaviors do not necessarily come naturally, and people need support and encouragement to develop and adopt them. A habit is an important factor that may motivate cybersecurity behaviors, but it has often been overlooked in past studies. To address this limitation, this study examined the formation of cybersecurity behavioral habits. Hierarchical regression analysis was used to analyze cybersecurity behavior survey data obtained from 393 college student participants.

Cybersecurity and defense
2022 - Simon Sweeney, Neil Winn - Informa UK Limited

The quest for substance, capability, and strategic autonomy goes on–or does it? Is the objective of CSDP territorial defence and strategic autonomy, or crisis management and softer security concerns like peacekeeping, border management, protection of shipping lanes, and/or cyber security? The Union needs to move beyond familiar complaints about the lack of common strategic culture and EU intrusion into NATO responsibilities. Geostrategic and economic imperatives dictate that the EU should progress CSDP beyond civilian crisis management in the EU Neighbourhood, and military training and security sector reform (SSR). The Strategic Compass must signal CSDP clarity of objectives, coherence, enhanced capability, and appropriate burden sharing with NATO. The response to the Strategic Compass must build European strategic autonomy in ways that strengthen NATO. For military strategic and economic reasons, both the EU and the post-Brexit UK need intensive cooperation to maintain their geostrategic relevance and strengthen the NATO alliance. This paper reflects on prospects for the EU Strategic Compass and offers timely analysis of recent trends in EU foreign and security policy and expresses cautious optimism regarding the enhanced European strategic autonomy/actorness. © 2022 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.

Cybersecurity and defense
2019 - - ArmisteadTEC LLC

This article examines the notion of cyberattack-and-defend co-evolution as a mechanism to better understand the influences that the opposing forces have on each other.

Cybersecurity and defense
2021 - Summer Rebensky, Meredith Carroll, Andrew Nakushian, Maria Chaparro, Tricia Prior - Springer International Publishing

Cybersecurity in consumer, corporate, and military settings, continues to be a growing concern in the modern and technologically driven world. As Wiederhold (2014) puts it, “the human factor remains the security’s weakest link in cyberspace.” A literature review related to human response to cybersecurity events reveals three phases involved in the cybersecurity response process, including: (1) Susceptibility, the phase preceding an event, which primarily encompasses behaviors that impact vulnerability to a cybersecurity event; (2) Detection of the event when it occurs; and (3) Response to the event after it occurs.

Cybersecurity and defense
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.