Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
This study analyzes changes in top arms producers, new complexities in arms regulation due to advancing technologies and artificial intelligence, arms-control policies of international organizations and top arms producers, and the risks of poor regulation.
Israel has positioned itself in the world not only as a high-tech country, start-up nation, the country investing the most in research and development, or the most attractive place for investors but also as top armament exporter. According to Stockholm International Peace Research Institute in 2018 Israel takes 8th place in that regard and stands besides US, Russia, France, China, Germany, UK. This raises a question: how can a small nation succeed in such competitive field of
industry? The aim of this study is to investigate Israel defense industry (IDI) context and developments in IDI from 1930s to 2018, as that could possibly indicate a way forward for countries that prefer to develop or enhance national defense industry. R
Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research.
This taxonomy is intended to align the cybersecurity terminologies, definitions, and domains to facilitate the categorisation of EU cybersecurity competencies. It provides a four-dimensional approach, including cybersecurity domains, sectors, technologies and use cases to categorize existing EU cybersecurity competence centres (e.g., research organisations or academic institutions) according to their cybersecurity expertise.
This report presents the results of a horizon scanning exercise, carried out by the Joint Research Centre (JRC), aiming to identify ‘emerging’ issues displaying potential for dual-use research and further applications, namely the use of civilian research outcomes for defence purposes and vice versa.
In this work, we are motivated to aid the security analyst by introducing a tool which will help to produce a swift and effective response to incoming threats. If an analyst identifies the nature of an incoming attack, our system can produce a ranked list of solutions for the analyst to quickly try out, saving both effort and time.
An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation.
The edited volume is unprecedented in the scope of topics as well as the size in the context of Lithuanian research regarding international relations and security. Though at first glance the topics might seem distant from one another, the structure of the edited volume has a reasoned approach. The volume starts from the chapters that analyse the core processes in the international system, then moves to the analysis of the main processes in the ideological field. Material and ideological elements define dynamic changes in the international order as well as domestic policies of the states, together with their bilateral and multilateral relations
we provide a comprehensive survey of the works that have been carried
out most recently (from 2013 to 2018) on ML in cybersecurity, describing the basics of cyber-attacks and corresponding
defenses, the basics of the most commonly used ML algorithms, and proposed ML and data mining schemes for cybersecurity in terms of features, dimensionality reduction, and classification/detection techniques. In this context, this article
also provides an overview of adversarial ML, including the security characteristics of deep learning methods. Finally, open
issues and challenges in cybersecurity are highlighted and potential future research directions are discussed.