Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,497,418 papers from all fields of science
Search
Sign In
Create Free Account
Cyberwarfare
Known as:
Electronic army
, Cyber security attack
, Cyber war
Expand
Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
API testing
Computer virus
Countermeasure (computer)
Cyber spying
Expand
Broader (4)
Computer security
Information sensitivity
Security engineering
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Attribution of Cyber Attacks on Industrial Control Systems
A. Cook
,
A. Nicholson
,
H. Janicke
,
L. Maglaras
,
Richard Smith
EAI Endorsed Trans. Ind. Networks Intell. Syst.
2016
Corpus ID: 31172398
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the…
Expand
2015
2015
Denial and Deception in Cyber Defense
Kristin E. Heckman
,
F. Stech
,
Ben S. Schmoker
,
Roshan K. Thomas
Computer
2015
Corpus ID: 29347231
As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial…
Expand
2015
2015
CSAAES: An expert system for cyber security attack awareness
Cheshta Rani
,
S. Goel
International Conference on Computing…
2015
Corpus ID: 18582922
Internet today is used by almost all the people, organizations etc. With this vast usage of internet, a lot of information is…
Expand
2014
2014
An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare
P. Shakarian
,
Gerardo I. Simari
,
Geoffrey Moores
,
S. Parsons
,
Marcelo A. Falappa
arXiv.org
2014
Corpus ID: 11949376
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and…
Expand
2013
2013
A novel framework to detect and block DDoS attack at the application layer
S. Sivabalan
,
P. Radcliffe
IEEE Tencon - Spring
2013
Corpus ID: 23234273
Detection and prevention of DDoS is still an area of ongoing research. A carefully crafted DDoS attack can fool present…
Expand
2012
2012
A treaty for governing cyber-weapons: Potential benefits and practical limitations
Louise Arimatsu
International Conference on Cyber Conflict
2012
Corpus ID: 26092994
Despite a greater willingness on the part of States to enter into a dialogue on the potential implications of cyber warfare…
Expand
2012
2012
Hybrid Threats, Cyber Warfare and NATO’s Comprehensive Approach for Countering 21st Century Threats – Mapping the New Frontier of Global Risk and Security Management
S. Bachmann
2012
Corpus ID: 62550144
The author examines NATO's comprehensive conceptual framework (the Capstone Concept) for identifying and discussing emerging…
Expand
2009
2009
Power Rules: How Common Sense Can Rescue American Foreign Policy
Leslie H. Gelb
2009
Corpus ID: 152866959
From one of the nation's leading foreign-policy minds comes a provocative new account of how to think about--and use--America's…
Expand
2004
2004
On Cyber Warfare Command and Control Systems
N. Howes
,
Michael J. Mezzino
,
John F. Sarkesain
2004
Corpus ID: 16955139
Abstract : As Defense agencies and services expand their reliance on computer networks, risk to information availability and…
Expand
1996
1996
Cyber Warfare
Michael Coleman
1996
Corpus ID: 116666942
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE