Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 211 - 220 of 350 references
2021 - jrc

This taxonomy is intended to align the cybersecurity terminologies, definitions, and domains to facilitate the categorisation of EU cybersecurity competencies. It provides a four-dimensional approach, including cybersecurity domains, sectors, technologies and use cases to categorize existing EU cybersecurity competence centres (e.g., research organisations or academic institutions) according to their cybersecurity expertise.

Civilian cybersecurity
2020 - JRC

This report presents the results of a horizon scanning exercise, carried out by the Joint Research Centre (JRC), aiming to identify ‘emerging’ issues displaying potential for dual-use research and further applications, namely the use of civilian research outcomes for defence purposes and vice versa.

Dual-use cybersecurity
2022 - Khandakar Ashrafi Akbar, Sadaf Md Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham - Springer International Publishing

In this work, we are motivated to aid the security analyst by introducing a tool which will help to produce a swift and effective response to incoming threats. If an analyst identifies the nature of an incoming attack, our system can produce a ranked list of solutions for the analyst to quickly try out, saving both effort and time.

Civilian cybersecurity
2018 - Erin D. Dumbacher - Informa UK Limited

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation.

Dual-use cybersecurity
2020 - MILITARY ACADEMY OF LITHUANIA

The edited volume is unprecedented in the scope of topics as well as the size in the context of Lithuanian research regarding international relations and security. Though at first glance the topics might seem distant from one another, the structure of the edited volume has a reasoned approach. The volume starts from the chapters that analyse the core processes in the international system, then moves to the analysis of the main processes in the ideological field. Material and ideological elements define dynamic changes in the international order as well as domestic policies of the states, together with their bilateral and multilateral relations

Cybersecurity and defense
2020 - Dipankar Dasgupta, Zahid Akhtar, Sajib Sen - SAGE Publications

we provide a comprehensive survey of the works that have been carried
out most recently (from 2013 to 2018) on ML in cybersecurity, describing the basics of cyber-attacks and corresponding
defenses, the basics of the most commonly used ML algorithms, and proposed ML and data mining schemes for cybersecurity in terms of features, dimensionality reduction, and classification/detection techniques. In this context, this article
also provides an overview of adversarial ML, including the security characteristics of deep learning methods. Finally, open
issues and challenges in cybersecurity are highlighted and potential future research directions are discussed.

Cybersecurity and defense
2024 - Ugochukwu Ikechukwu Okoli, Ogugua Chimezie Obi, Adebunmi Okechukwu Adewusi, Temitayo Oluwaseun Abrahams - GSC Online Press

This paper examines the significance of ML in the field of cybersecurity, with a special emphasis on the identification of threats and the implementation of protective measures. By incorporating ML algorithms into cybersecurity frameworks, organisations may automate decision-making processes, facilitating prompt responses to ever-changing threats. Lastly, the paper covers the obstacles and ethical issues related to the adoption of ML in cybersecurity. Issues like as adversarial assaults, skewed datasets, and the interpretability of ML models are examined, highlighting the necessity for a holistic strategy that integrates modern technology with ethical considerations.

Civilian cybersecurity
2021 - Agustín Salas-Fernández, Sanjay Misra, Broderick Crawford, Ricardo Soto - Springer International Publishing

This study aims to investigate the metaheuristics applied to optimize artificial intelligence techniques in the detection of threats or optimization of attacks by using specific measures: detection or attack technique, purpose and the type of metahauristics involved.

Cybersecurity and defense
2021 - Vitalii Susukailo, Ivan Opirsky, Oleh Yaremko - Springer International Publishing

The chapter addresses the Information Security Management System (ISMS) establishment approach, ensuring necessary controls to avoid widespread cybersecurity threats nowadays. The most common attack vectors and techniques of the last three years were analyzed in this chapter to define a set of information security practices, which can minimize risks related to modern cybersecurity threats.

Cybersecurity and defense
2022 - sd-magazine

this paper deals with military mobility, which in recent years has become one of the strategic priorities for both the North Atlantic Treaty Organization (NATO) and the European Union (EU). The authors argue that the ability to quickly transport soldiers and military equipment over long distances across member states’ territories is a prerequisite for an effective and rapid military response by the allies. An analysis of the achievements to date shows that the European Union is one of the key actors in identifying and eliminating existing barriers and initiating necessary infrastructure construction. Simultaneously, close cooperation with the North Atlantic Treaty Organization in this area allows the parties involved to achieve synergies.

Dual-use cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.