Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,525,241 papers from all fields of science
Search
Sign In
Create Free Account
Cyberwarfare
Known as:
Electronic army
, Cyber security attack
, Cyber war
Expand
Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
API testing
Computer virus
Countermeasure (computer)
Cyber spying
Expand
Broader (4)
Computer security
Information sensitivity
Security engineering
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Prioritizing investment in military cyber capability using risk analysis
C. Rowe
,
Hossein Seif Zadeh
,
+4 authors
A. Ween
2019
Corpus ID: 65091329
Defense capability planning traditionally uses scenario-based war-gaming to support force design decision making and to…
Expand
2017
2017
Introduction to the Special Issue on Secure Solutions for Network in Scalable Computing
Kavita Sharma
,
Suman Bala
,
Himani Bansal
,
Gulshan Shrivastava
Scalable Computing : Practice and Experience
2017
Corpus ID: 41243353
This special issue aimed at incarceration of new insights, dimensions, visionaries and accomplishments achievable for security…
Expand
2016
2016
Trading exploits online: A preliminary case study
Jukka Ruohonen
,
Sami Hyrynsalmi
,
Ville Leppänen
Research Challenges in Information Science
2016
Corpus ID: 552239
A software defect that exposes a software system to a cyber security attack is known as a software vulnerability. A software…
Expand
2016
2016
Android device hacking tricks and countermeasures
Khulood Al Zaabi
IEEE International Conference on Cybercrime and…
2016
Corpus ID: 16819431
Cybercrimes have increased against Android devices due to the increased usage of Instant Messaging, Global Positioning Systems…
Expand
2014
2014
The Hyper-Personalization of War: Cyber, Big Data, and the Changing Face of Conflict
Dunlap
,
J. Charles
2014
Corpus ID: 151104279
For those who participate in it, all war can seem “hyper-personalized.” But advances in cyber technology have enabled…
Expand
2014
2014
An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare
Paulo Shakarian
,
Gerardo I. Simari
,
Geoffrey Moores
,
S. Parsons
,
Marcelo A. Falappa
arXiv.org
2014
Corpus ID: 11949376
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and…
Expand
2012
2012
A treaty for governing cyber-weapons: Potential benefits and practical limitations
Louise Arimatsu
International Conference on Cyber Conflict
2012
Corpus ID: 26092994
Despite a greater willingness on the part of States to enter into a dialogue on the potential implications of cyber warfare…
Expand
2012
2012
The Myth of Cyberwar Bringing War on the Internet Back Down to Earth ∗
E. Gartzke
2012
Corpus ID: 29396128
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable potentially…
Expand
2010
2010
Proposing a multi-touch interface for intrusion detection environments
Jeffrey Guenther
,
Fred Volk
,
Mark Shaneck
Visualization for Computer Security
2010
Corpus ID: 14815861
Network Intrusion Detection is a critical task in today's environment, where network attacks and intrusions are everyday…
Expand
1996
1996
Cyber Warfare
Michael Coleman
1996
Corpus ID: 116666942
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE