DDoS attack detection and mitigation using SDN: methods, practices, and solutions
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …
Unsolved problems in ml safety
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …
[PDF][PDF] Simulation for cybersecurity: state of the art and future directions
H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
X-risk analysis for ai research
D Hendrycks, M Mazeika - arXiv preprint arXiv:2206.05862, 2022 - arxiv.org
Artificial intelligence (AI) has the potential to greatly improve society, but as with any
powerful technology, it comes with heightened risks and responsibilities. Current AI research …
powerful technology, it comes with heightened risks and responsibilities. Current AI research …
[图书][B] Cyber persistence theory: Redefining national security in cyberspace
MP Fischerkeller, EO Goldman, RJ Harknett - 2022 - books.google.com
A bold re-conceptualization of the fundamentals driving behavior and dynamics in
cyberspace. Most cyber operations and campaigns fall short of activities that states would …
cyberspace. Most cyber operations and campaigns fall short of activities that states would …
Cyber deterrence: Tougher in theory than in practice?
W Goodman - Strategic Studies Quarterly, 2010 - JSTOR
How difficult is cyber deterrence? Some theorists argue that it is quite difficult. 1 These
skeptics make valid points; the domain of cyberspace does pose unique challenges for an …
skeptics make valid points; the domain of cyberspace does pose unique challenges for an …
Cyberspace: Definition and implications
R Ottis, P Lorents - … Conference on Cyber Warfare and Security, 2010 - search.proquest.com
In recent years the term" cyber" has been used to describe almost anything that has to do
with networks and computers, especially in the security field. Another emerging field of study …
with networks and computers, especially in the security field. Another emerging field of study …
The birth of cyberwar
R Kaiser - Political Geography, 2015 - Elsevier
Within western security discourse, the threat posed by cyberwar has risen from a barely
acknowledged concern to one of the greatest challenges confronting the West and the world …
acknowledged concern to one of the greatest challenges confronting the West and the world …
[HTML][HTML] When shutdown is no option: Identifying the notion of the digital government continuity paradox in Estonia's eID crisis
I Skierka - Government Information Quarterly, 2023 - Elsevier
States must increasingly manage cybersecurity threats and disruptions in their digital
government infrastructures. However, the digital government literature lacks a systematic …
government infrastructures. However, the digital government literature lacks a systematic …