Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,265,143 papers from all fields of science
Search
Sign In
Create Free Account
Cyberwarfare
Known as:
Electronic army
, Cyber security attack
, Cyber war
Expand
Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
API testing
Computer virus
Countermeasure (computer)
Cyber spying
Expand
Broader (4)
Computer security
Information sensitivity
Security engineering
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
CSAAES: An expert system for cyber security attack awareness
Cheshta Rani
,
S. Goel
International Conference on Computing…
2015
Corpus ID: 18582922
Internet today is used by almost all the people, organizations etc. With this vast usage of internet, a lot of information is…
Expand
2014
2014
An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare
Paulo Shakarian
,
Gerardo I. Simari
,
Geoffrey Moores
,
S. Parsons
,
Marcelo A. Falappa
arXiv.org
2014
Corpus ID: 11949376
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and…
Expand
2013
2013
Exploring the prudent limits of automated cyber attack
J. Caton
International Conference on Cyber Conflict
2013
Corpus ID: 28623486
The notion of cyber conflict occurring at network rates that surpass the speed of decision-making by national leaders has…
Expand
2012
2012
A treaty for governing cyber-weapons: Potential benefits and practical limitations
Louise Arimatsu
International Conference on Cyber Conflict
2012
Corpus ID: 26092994
Despite a greater willingness on the part of States to enter into a dialogue on the potential implications of cyber warfare…
Expand
2012
2012
Hybrid Threats, Cyber Warfare and NATO’s Comprehensive Approach for Countering 21st Century Threats – Mapping the New Frontier of Global Risk and Security Management
S. Bachmann
2012
Corpus ID: 62550144
The author examines NATO's comprehensive conceptual framework (the Capstone Concept) for identifying and discussing emerging…
Expand
2012
2012
The Myth of Cyberwar Bringing War on the Internet Back Down to Earth ∗
E. Gartzke
2012
Corpus ID: 29396128
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable potentially…
Expand
2010
2010
Proposing a multi-touch interface for intrusion detection environments
Jeffrey Guenther
,
Fred Volk
,
Mark Shaneck
Visualization for Computer Security
2010
Corpus ID: 14815861
Network Intrusion Detection is a critical task in today's environment, where network attacks and intrusions are everyday…
Expand
2010
2010
'WHERE IS MY VOTE?' ICT Politics in the Aftermath of Iran's Presidential Election
M. H. Sohrabi-Haghighat
,
S. Mansouri
2010
Corpus ID: 154651534
Iran’s 2009 presidential election was a controversial political event and came prominently into global media focus. Alleged large…
Expand
2002
2002
Creating a Force for Peace Operations: Ensuring Stability with Justice
K. Field
,
Robert M. Perito
Parameters
2002
Corpus ID: 152475190
The terrorist attacks on the United States on 11 September 2001 took the world by surprise. Yet the US military and its coalition…
Expand
1996
1996
Cyber Warfare
Michael Coleman
1996
Corpus ID: 116666942
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required