Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 151 - 160 of 350 references
2022 - Jonathan Herbach - Edward Elgar Publishing

Technology is a key factor in, and often catalyst for, arms control. The increasingly rapid pace of technological change with respect to weapons systems and military capabilities, as well as of developments of inherently dual-use technologies (with both peaceful and military applications), present clear challenges to the law of arms control, both in terms of the application and/or potential modification of existing instruments, as well as the prospects for new regulation where necessary. Not only are military technologies, or technologies with a potential military dimension, developing rapidly, but the increasing diffusion of such technologies to more and more states and possibly to non-state actors further complicates the situation.

Dual-use cybersecurity
2022 - Yu Zheng, Zheng Li, Xiaolong Xu, Qingzhan Zhao - Elsevier BV

we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security. Specifically, we firstly introduce basic concepts and define dynamic defense in cyber security. Next, we review the architectures, enabling techniques and methods for moving target defense and mimic defense. This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense. Finally, we discuss some open challenges and opportunities for dynamic defense in cyber security.

Cybersecurity and defense
2018 - IAEA

With the progress of technologies for telecommunication, synthetic biology, chemistry, additive manufacturing and nanoscale processes, many opportunities arise, allowing more effective and innovative production and the achievement of results with great potential both on the technical and commercial sides. At the same time however, rapid technological developments may create opportunities and vulnerabilities that can be exploited for illicit procurement activities seeking sensitive items for proliferation programmes. The strategic trade control framework should evolve with the same pace. Enforcement and traceability of intangible technology transfer controls may become much more challenging, while at the same time improved approaches to internal compliance must be developed by suppliers and technology holders.

Dual-use cybersecurity
2020 - Antonio Calcara, Raluca Csernatoni, Chantal Lavallée - Routledge

The Introduction first clarifies this new wave of technological innovation to explore the implications for human–machine relations, especially in the security sector, emphasising the characteristics of these emerging technologies and the main ethical and legal concerns, as well as their definitional challenges. Finally, it provides a comprehensive view of the distinctive European Union policy-making process and its impact on the governance of emerging security technologies.

Dual-use cybersecurity
2021 - Fnu Jimmy - Valley International

This research article undertakes a comprehensive examination of the prevailing cybersecurity risks, while also delving into the transformative potential of AI in ameliorating these perilous hazards. Through a meticulous review of extant literature and insightful case studies, the article meticulously delineates emergent cyber threats, elucidating the manifold applications of AI in the realms of threat detection, prevention, and incident response.Furthermore, this research endeavor meticulously elucidates the intricate nexus of challenges and limitations inherent within AI-powered cybersecurity systems, encompassing ethical quandaries and technical impediments. By delineating these complexities, the article endeavors to foster a nuanced understanding of the intricate interplay between AI and cybersecurity.

Dual-use cybersecurity
2023 - ENISA

This is the eleventh edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape.

Cybersecurity and defense
2024 - ENISA

Seven prime cybersecurity threats were identified in 2024

Civilian cybersecurity
2018 - Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam - Apress

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom.

Cybersecurity and defense
2018 - Michael J. Reagin, Michael V. Gentry - Ovid Technologies (Wolters Kluwer Health)

Sentara Healthcare’s experience in cybersecurity. Modern cyberattacks impact much more than privacy and brand reputation; they can disrupt the safe delivery of care. For instance, in 2017, a global security incident affected National Health Service hospitals in England and Scotland, preventing them from providing patient services and leading to the cancellation of thousands of appointments.

Civilian cybersecurity
2017 - Monica M. Ruiz - IEEE

This paper provides background on prior US cyber defense initiatives and delves into the EDL CDU to draw possible theoretical structures and lessons for the formation and integration of the proposed US CDU. It also examines ongoing developments with the US Cyber Mission Force (CMF) to compare efforts. The paper includes primary and secondary source material from academia, government, and private sectors in both the US and Estonia. It analyzes ongoing efforts for cyber defense and reviews academic literature and research on the topics discussed.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.