International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
Risks of Critical Infrastructure Adoption of Cloud Computing by Government 政府关键基础设施采用云计算的风险
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070104
Mansoor Al-Gharibi, M. Warren, W. Yeoh
{"title":"Risks of Critical Infrastructure Adoption of Cloud Computing by Government","authors":"Mansoor Al-Gharibi, M. Warren, W. Yeoh","doi":"10.4018/ijcwt.2020070104","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070104","url":null,"abstract":"The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"26 1","pages":"47-58"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74321359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Cyber Security Issues in Sri Lanka 斯里兰卡网络安全问题研究
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070105
R. Nagahawatta, M. Warren, W. Yeoh
{"title":"A Study of Cyber Security Issues in Sri Lanka","authors":"R. Nagahawatta, M. Warren, W. Yeoh","doi":"10.4018/ijcwt.2020070105","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070105","url":null,"abstract":"Cybersecurity is focused on helping the community to make knowledgeable decisions on its adaptation and mitigation. This survey evaluated the level of cybersecurity awareness and discernment amongst university students in Sri Lanka. The study was based on primary data collected through a questionnaire on awareness and the perception of cybersecurity from respondents at universities in Sri Lanka. The results indicated that experience and the level of cybersecurity awareness among university students in Sri Lanka are not significantly low, but there are some knowledge gaps with new threats. Further, the results showed that university students in Sri Lanka were able to identify cybercrime as a threat. These findings necessitate building awareness and developing capacity to improve student's knowledge on the cybersecurity subject especially if universities are to be used as a key focal point in cybersecurity awareness campaigns in Sri Lanka.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"7 1","pages":"59-72"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78674999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deceiving Autonomous Drones 欺骗性无人驾驶飞机
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070101
W. Hutchinson
{"title":"Deceiving Autonomous Drones","authors":"W. Hutchinson","doi":"10.4018/ijcwt.2020070101","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070101","url":null,"abstract":"This speculative article examines the concept of deceiving autonomous drones that are controlled by artificial intelligence (AI) and can work without operational input from humans. This article examines the potential of autonomous drones, their implications and how deception could possibly be a defence against them and /or a means of gaining advantage. It posits that officially, no truly autonomous drone is operational now, yet the development of AI and other technologies could expand the capabilities of these devices, which will inevitably confront society with a number of deep ethical, legal, and philosophical issues. The article also examines the impact of autonomous drones and their targets in terms of the power/deception nexus. The impact of surveillance and kinetic impacts on the target populations is investigated. The use of swarms can make deception more difficult although security can be breached. The Internet of Things can be considered as based on the same model as a swarm and its impact on human behaviour indicates that deception or perhaps counter-deception should be considered as a defence. Finally, the issues raised are outlined. However, this article does not provide definitive answers but, hopefully, exposes a number of issues that will stimulate further discussion and research in this general area.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"123 10 1","pages":"1-14"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77357353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset 在极不平衡数据集上使用监督机器学习算法进行内部威胁检测
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040101
Naghmeh Moradpoor Sheykhkanloo, A. Hall
{"title":"Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset","authors":"Naghmeh Moradpoor Sheykhkanloo, A. Hall","doi":"10.4018/ijcwt.2020040101","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040101","url":null,"abstract":"An insider threat can take on many forms and fall under different categories. This includes malicious insider, careless/unaware/uneducated/naïve employee, and the third-party contractor. Machine learning techniques have been studied in published literature as a promising solution for such threats. However, they can be biased and/or inaccurate when the associated dataset is hugely imbalanced. Therefore, this article addresses the insider threat detection on an extremely imbalanced dataset which includes employing a popular balancing technique known as spread subsample. The results show that although balancing the dataset using this technique did not improve performance metrics, it did improve the time taken to build the model and the time taken to test the model. Additionally, the authors realised that running the chosen classifiers with parameters other than the default ones has an impact on both balanced and imbalanced scenarios, but the impact is significantly stronger when using the imbalanced dataset.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"61 s81","pages":"1-26"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijcwt.2020040101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72389991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Deep Learning in Cybersecurity: Challenges and Approaches 网络安全中的深度学习:挑战和方法
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040105
Y. Imamverdiyev, F. Abdullayeva
{"title":"Deep Learning in Cybersecurity: Challenges and Approaches","authors":"Y. Imamverdiyev, F. Abdullayeva","doi":"10.4018/ijcwt.2020040105","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040105","url":null,"abstract":"In this article, a review and summarization of the emerging scientific approaches of deep learning (DL) on cybersecurity are provided, a structured and comprehensive overview of the various cyberattack detection methods is conducted, existing cyberattack detection methods based on DL is categorized. Methods covering attacks to deep learning based on generative adversarial networks (GAN) are investigated. The datasets used for the evaluation of the efficiency proposed by researchers for cyberattack detection methods are discussed. The statistical analysis of papers published on cybersecurity with the application of DL over the years is conducted. Existing commercial cybersecurity solutions developed on deep learning are described.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":"82-105"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81909534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting and Explaining Cyber Ethics with Ethical Theories 用伦理理论预测和解释网络伦理
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040103
Winfred Yaokumah
{"title":"Predicting and Explaining Cyber Ethics with Ethical Theories","authors":"Winfred Yaokumah","doi":"10.4018/ijcwt.2020040103","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040103","url":null,"abstract":"Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace.Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent.Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics.Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses. Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber privacy,andacademicintegrity.Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity. KEyWoRdS Academic Integrity, Consequentialism, Cyber Ethics, Cyber Security, Deontology, Ethical Theory, Intellectual Property, Piracy, Plagiarism, Privacy, Virtue Ethics","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":"46-63"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84733692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization 危机管理中基于行为的风险沟通模型与社会风险最小化
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040102
Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko
{"title":"On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization","authors":"Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko","doi":"10.4018/ijcwt.2020040102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040102","url":null,"abstract":"Thearticleformulatesandcalibratesaformalmodelofriskcommunicationsintheframeworkof arisk-basedcommunityresilienceassessmentapproachintransformingsocietiesundercrisesand conflicts.Itwasdemonstratedthatperceptionofrisksisnotadequate.Thissituationisrecognizedas athreat,whichleadstoasignificantincreaseoflossesandtospreadingofwrongcrisismanagement practices.Toimprovedecision-makingatthepersonal,group,andpopulationlevels,abehavioralbasedcommunicationmodelhasbeenproposed.Themodifiedformofengagementintocollective actionsforsubstantiallyfractionalizedsocietyisproposed.Anumberofmodelsofactioncallsand acollectivedecision-makingunderstressconditionswithdynamiccommunicationareputforward. Onthebasisof thedevelopedmodel,waysofoptimizingcommunicationstrategiesareaimedat correspondingriskminimizationaredeveloped.Futureresearchdirectionsarehighlighted. KeyWORdS Behavioral Model, Communication Model, Community Resilience, Crisis Anthropology, Crisis, Decision Making, Global Transformations, Group Dynamics, Risk Communications, Risk Perception","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"26 1","pages":"27-45"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijcwt.2020040102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72460413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Security Aspects of Automotive Over-the-Air Updates 汽车无线更新的安全问题
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040104
J. Howden, L. Maglaras, M. Ferrag
{"title":"The Security Aspects of Automotive Over-the-Air Updates","authors":"J. Howden, L. Maglaras, M. Ferrag","doi":"10.4018/ijcwt.2020040104","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040104","url":null,"abstract":"Over-the-air(OTA)updateisamethodforvehiclemanufacturerstoremotelydistributemaintenance updates,performance,andfeatureenhancementsthroughthevehicle’slifespan.Recallsofvehicles costthemanufacturesalotofmoney.OTAsolvestherecallissue,whileallowingconsumerstopay forservicesandfeaturesviaanupdate.TheOTAecosystemincludesthecoderswhofirstdeveloped the firmware, the 1st Tier suppliers, the vehicle manufacturers, and the vehicle itself. Currently, manufacturersdesignedthenetworksforspeedandresponsiveness,andnotsecurity.Thisarticle examinestheseelementsanddrillsintothesecurityavailableforeach.Theslowestandoneofthe mostvulnerablepartsofthesystemisthecommunicationswithinthevehicle.Thevehiclenetworks mustensuretheintegrityandauthenticityofmessagestransmittedtoguaranteesoftwareprogrammed ontoECUsareauthorizedandtamper-free.Specialisthardwarewithinthevehiclemakesthispossible inanoperationenvironment,suchashardwaresecuritymodules. KeyWORdS Electronic Control Units, Automated Cars, Over-The-Air Updates, Connected Vehicles, Security, Cryptography, Hardware Security Module, Trust","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":"64-81"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85448899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber-Security for ICS/SCADA ICS/SCADA的网络安全
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch038
Barend Pretorius, B. van Niekerk
{"title":"Cyber-Security for ICS/SCADA","authors":"Barend Pretorius, B. van Niekerk","doi":"10.4018/978-1-7998-2466-4.ch038","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch038","url":null,"abstract":"Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"86 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73468594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities 面向交通的智慧城市电动汽车集成的大数据分析平台
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch051
M. Hussain, M. Beg, M. S. Alam, S. Laskar
{"title":"Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities","authors":"M. Hussain, M. Beg, M. S. Alam, S. Laskar","doi":"10.4018/978-1-7998-2466-4.ch051","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch051","url":null,"abstract":"Electric vehicles (EVs) are key players for transport oriented smart cities (TOSC) powered by smart grids (SG) because they help those cities to become greener by reducing vehicle emissions and carbon footprint. In this article, the authors analyze different use-cases to show how big data analytics (BDA) can play vital role for successful electric vehicle (EV) to smart grid (SG) integration. Followed by this, this article presents an edge computing model and highlights the advantages of employing such distributed edge paradigms towards satisfying the store, compute and networking (SCN) requirements of smart EV applications in TOSCs. This article also highlights the distinguishing features of the edge paradigm, towards supporting BDA activities in EV to SG integration in TOSCs. Finally, the authors provide a detailed overview of opportunities, trends, and challenges of both these computing techniques. In particular, this article discusses the deployment challenges and state-of-the-art solutions in edge privacy and edge forensics.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"46 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80371753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信