Preface to special issue on the cognitive science of cyber defence analysis (original) (raw)

Profile image of Nancy CookeNancy Cooke

2013, ICST Transactions on Security and Safety

visibility

description

3 pages

link

1 file

A concept for strategic cyber defense

Don Faatz

2003

View PDFchevron_right

Mechanisms of cyber security: the problem of conceptualization

Piotr Milczarski

Безпека інформаціі, 2019

View PDFchevron_right

Framing the Human Dimension in Cybersecurity

Jim Nixon

View PDFchevron_right

The AI-Cybersecurity Nexus: The Good and the Evil

San Murugesan

IT Professional

View PDFchevron_right

Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent

Shouhuai Xu

IEEE/ACM Transactions on Networking

View PDFchevron_right

Cyber-Security Threats Origins and their Analysis

Maroš Čergeť

Acta Polytechnica Hungarica, 2022

View PDFchevron_right

Computational Intelligence, Cyber Security and Computational Models

Vijayalakshmi Ramasamy

Advances in Intelligent Systems and Computing, 2014

View PDFchevron_right

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

Andrey L Kozik

View PDFchevron_right

Justifying Cyber-intelligence?

Ross Bellaby

Journal of Military Ethics, 2016

View PDFchevron_right

Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats

Carlos Pedro Gonçalves

Cyberspace [Working Title], 2019

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Analysis of Information System Threats

Inomjon Yarashov

2021

View PDFchevron_right

AI-Driven Cybersecurity: Balancing Advancements and Safeguards

Rakibul Hasan

Journal of computer science and technology studies, 2024

View PDFchevron_right

The Battle Against Security Attacks

Katina Michael

2002

View PDFchevron_right

Cyber Security

marvin odhiambo

View PDFchevron_right

Cyber security: challenges for society-literature review

Kent Zamora

View PDFchevron_right

Guide to developing a National Cyber Security Strategy

Mohammed I Alghamdi

Materials Today: Proceedings, 2021

View PDFchevron_right

The Influence of AI's brain on Cybersecurity

Dr. Teklu Urgessa

Zenodo (CERN European Organization for Nuclear Research), 2023

View PDFchevron_right

Cybersecurity Infrastructure and Security Automation

ALEX R MATHEW

Advanced Computing: An International Journal

View PDFchevron_right

Protecting against cyber threats in networked information systems

vipin kumar

Battlespace Digitization and Network-Centric Systems III, 2003

View PDFchevron_right

Finding the New High Ground in Cyber War: Malware as an Instrument of War

Tobias Philbin

Journal of Homeland Security and Emergency Management, 2013

View PDFchevron_right

Human Factors of Cyber Attacks: A Framework for Human-Centered Research

Victor Finomore

Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2014

View PDFchevron_right

Attack surface definitions: A systematic literature review

Mahran Al-Zyoud

Information and Software Technology, 2018

View PDFchevron_right

Introduction: Conceptualizing Communication <----> Security

Bryan C . Taylor

The Handbook of Communication and Security , 2019

View PDFchevron_right

Desecuritising cybersecurity: towards a societal approach

joe burton

Journal of Cyber Policy, 2020

View PDFchevron_right

Cyber Terrorism Threat and the Pandemic

Ivana Luknar

2020

View PDFchevron_right

On Military Theory

Milan Vego

2011

View PDFchevron_right

Getting Ahead of the Threat

Richard Strelitz

2008

View PDFchevron_right

Gaining an Edge in Cyberspace with Advanced Situational Awareness

Albert Blarer

IEEE Security & Privacy, 2015

View PDFchevron_right

Cyber Operations as Nuclear Counterproliferation Measures

Marco Roscini

Journal of Conflict and Security Law, 2014

View PDFchevron_right

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar

Journal in Computer Virology, 2007

View PDFchevron_right

CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 4

Janusz Zalewski

2006

View PDFchevron_right

Motivation and Requirements for Determining a Network Warfare Capability

J. Eloff

View PDFchevron_right

Complexity: the dark side of network-centric warfare

Mats Carlerby

Cognition, Technology & Work, 2012

View PDFchevron_right

National Security Challenges: Insights from Social, Neurobiological, and Complexity Sciences

Diane DiEuliis

View PDFchevron_right

Toward a Preliminary Theory of Cyberpower

Larry Wentz

Cyberpower and National Security

View PDFchevron_right

Computer Science