Skip to main content
Starting from the early 2000s it became clear that classic cyber protection wasn’t enough anymore. Traditional strategies are based on a signature approach where the security system is familiar with the behavior (signature) of the... more
The current development of a cyber defence policy by the North Atlantic Treaty Organization (NATO) is usually seen as exemplifying the alliance’s changing scope of intervention; as well as its broadened perception of security. From an... more
This paper presents the sharing of our experiences and lessons learned to modernize a warship with C6ISR utilizing the digital engineering MBSE models of complex systems. We captured Enterprise Architecture (EA) DoDAF views, KPP and KSA... more
With growing global political weight and one of the biggest digital markets in the world, India, a leading developing country in the G77, is poised to play a critical role in the WSIS+10 Review. In line with its earlier positions on... more
The United States military conducts operations on the sea, in the air, and on the land. As the world flattens with the dawn of the cyber age, the United States Navy finds itself on the front lines of the emerging battlefield of... more
First monograph linking ethics and conduct of cyber conflict, including for the first time a description of "state-sponsored hacktivism" as the preferred mode of cyber warfare. Offers the first sustained critique of the Tallinn Manual on... more
In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... more
At the recently concluded ITU Plenipotentiary Conference in Busan, India proposed a controversial new resolution that sought to contribute to realising a more secure information society. But while some criticisms of the draft resolution... more
With the arrival of cyberspace, a whole host of new security and other challenges have arisen which are not always adequately tackled. In order to deal with them more appropriately, India has repeatedly argued for a greater role of the UN... more
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their... more
Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is... more
This chapter provides a political and philosophical analysis of the values at stake in ensuring cyber-security for critical infrastructures. It presents a review of the boundaries of cybersecurity in nation-al security, with a focus on... more
Proceedings of the INTERNATIONAL CONFERENCE ON
"CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"
The following paper explores the main resolutions of the EU since the break of the millennium regarding Cyber-related issues, estimates whether they have a practical sense or only a declaratory nature, and lays out some observances... more
Experts in cybersecurity principles for satellite and space systems believe that with the stakes so high when it comes to protecting the data that satellites carry, security cannot be an afterthought. It must play an integral part of the... more
Seminário ao Mestrado em Segurança da Informação e Comunicação, da VSB - Universidade Técnica de Ostrava, República Checa, 30 de abril de 2019.
The WordPress platform is without a doubt the most popular CMS platform on the web. This platform has various features and tools which make it the preferred option for many website owners. Its popularity has captured the imagination of... more
Fragile, corrupt and ineffective National Health Systems in authoritarian regimes deserve greater attention by the Intelligence Community.
Submission to 2021-2025 UN Open-Ended Working Group (OEWG) on security of and in the use of information and communications technologies. This paper discusses technical attribution and options to make it more transparent and accessible... more
Presented at the 2018 Florida Cyber Conference, Cyberville demonstrates modern exploits on critical infrastructure (SCADA/ICS) while visually and interactively representing potential disruption on a physical model of the Tampa Bay region.... more
Digitalization is exposing developing countries to a growing number of risks as well as opportunities associated with connecting to the Internet. Myanmar stands out as a critical case of both the pitfalls and the benefits Internet... more
In recent years, the growth of brain-computer interfaces (BCIs) has been remarkable in specific application fields, such as the medical sector or the entertainment industry. Most of these fields use evoked potentials, like P300, to obtain... more
Timely sharing of cyber security related information between organizations has long been perceived as an effective measure to address cyber security challenges. Even though information sharing is a cost-effective tool and a crucial step... more
This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a... more
Medical training devices are becoming increasingly dependent on technology creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and... more
About ISACA ® With more than 100,000 constituents in 180 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security,... more
Intrusion Detection is a topic that is of interest both in the corporate world as well as academia. In the advent of Big Data Analytics, multiple analytics techniques can be used on the enormous amounts of data that is being generated... more
The purpose of this study was to examine pedagogical best practices for student mastery of cybersecurity competencies. Additionally, the researcher explored factors that may either promote or hinder student learning in cybersecurity... more
Data Theft is a rampant crime in India. Employees steal data as it is there gratuity. As per The IT Act,2000 Data Theft is a cyber crime in India and attracts criminal as well as civil remedies. This articles discusses the law provisions... more
Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the next global superpowers [1],... more
We are living in the age of globally connected information systems. Very few networks remain isolated because of the need to reach consumers or pass information around the world. Banks, social networking companies, and retailers are all... more
La ciberseguridad es un problema a hacer frente por los despachos de abogados, grandes y pequeños y en esta profesión lo estamos abordando realmente mal. Es difícil luchar contra algo que no se ve y poca gente entiende, sobre todo cuando... more
The requirement for a collaborative effort to achieve a common set of security standards for use by entities that process, store or transport voter data. -More than 350,000 voting machines are used in the Unites States today in over 42... more
Amidst an explosion in digital health product investment, increasingly frequent cybersecurity vulnerabilities, and a scattered regulatory framework, the digital health marketplace requires a clear, measured approach to consumer safety and... more
The book faces an essential contemporary issue: the definition of the limits of action, protection and use of cyberspace as a fifth operational domain, as well as in the measures to be taken to make this environment more secure. Using the... more
Smart homes and healthcare have increasingly grown more popular in the recent years. Due to the amount of data, it records the need for a more secure method is needed to ensure security and privacy. Consequently, these methods can also... more
Malware, also referred to as the distribution of a malicious code present relentless opposition to cybersecurity. In this generation, identifying malware in systems is becoming a war seemingly with no end since the malware is ever... more
The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with... more