Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 211 - 220 of 357 references
2021 - Rizwan Majeed, Nurul Azma Abdullah, Muhammad Faheem Mushtaq, Muhammad Umer, Michele Nappi - MDPI AG

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.

2023 - Layton J. Mandle, Frederic S. Pearson - SAGE Publications

This study analyzes changes in top arms producers, new complexities in arms regulation due to advancing technologies and artificial intelligence, arms-control policies of international organizations and top arms producers, and the risks of poor regulation.

Cybersecurity and defense
2020 - ECPR

Israel has positioned itself in the world not only as a high-tech country, start-up nation, the country investing the most in research and development, or the most attractive place for investors but also as top armament exporter. According to Stockholm International Peace Research Institute in 2018 Israel takes 8th place in that regard and stands besides US, Russia, France, China, Germany, UK. This raises a question: how can a small nation succeed in such competitive field of
industry? The aim of this study is to investigate Israel defense industry (IDI) context and developments in IDI from 1930s to 2018, as that could possibly indicate a way forward for countries that prefer to develop or enhance national defense industry. R

Cybersecurity and defense
2019 - Christian Reuter, Larissa Aldehoff, Thea Riebe, Marc-André Kaufhold - Springer Fachmedien Wiesbaden

Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research.

Dual-use cybersecurity
2021 - jrc

This taxonomy is intended to align the cybersecurity terminologies, definitions, and domains to facilitate the categorisation of EU cybersecurity competencies. It provides a four-dimensional approach, including cybersecurity domains, sectors, technologies and use cases to categorize existing EU cybersecurity competence centres (e.g., research organisations or academic institutions) according to their cybersecurity expertise.

Civilian cybersecurity
2020 - JRC

This report presents the results of a horizon scanning exercise, carried out by the Joint Research Centre (JRC), aiming to identify ‘emerging’ issues displaying potential for dual-use research and further applications, namely the use of civilian research outcomes for defence purposes and vice versa.

Dual-use cybersecurity
2022 - Khandakar Ashrafi Akbar, Sadaf Md Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham - Springer International Publishing

In this work, we are motivated to aid the security analyst by introducing a tool which will help to produce a swift and effective response to incoming threats. If an analyst identifies the nature of an incoming attack, our system can produce a ranked list of solutions for the analyst to quickly try out, saving both effort and time.

Civilian cybersecurity
2018 - Erin D. Dumbacher - Informa UK Limited

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation.

Dual-use cybersecurity
2020 - MILITARY ACADEMY OF LITHUANIA

The edited volume is unprecedented in the scope of topics as well as the size in the context of Lithuanian research regarding international relations and security. Though at first glance the topics might seem distant from one another, the structure of the edited volume has a reasoned approach. The volume starts from the chapters that analyse the core processes in the international system, then moves to the analysis of the main processes in the ideological field. Material and ideological elements define dynamic changes in the international order as well as domestic policies of the states, together with their bilateral and multilateral relations

Cybersecurity and defense
2020 - Dipankar Dasgupta, Zahid Akhtar, Sajib Sen - SAGE Publications

we provide a comprehensive survey of the works that have been carried
out most recently (from 2013 to 2018) on ML in cybersecurity, describing the basics of cyber-attacks and corresponding
defenses, the basics of the most commonly used ML algorithms, and proposed ML and data mining schemes for cybersecurity in terms of features, dimensionality reduction, and classification/detection techniques. In this context, this article
also provides an overview of adversarial ML, including the security characteristics of deep learning methods. Finally, open
issues and challenges in cybersecurity are highlighted and potential future research directions are discussed.

Cybersecurity and defense
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.