Cyber warfare trends and future
Nowadays, an old fiction known as cyber warfare is coming true. US Pentagon declared Cyber Warfare as “Act of War” [1] which makes the Cyber Warfare one of the battlefields (sea, ground, space and air) [2]; if any type of cyber warfare gets detected, the identified source of the attack is responsibl...
| Main Authors: | Ganji, Majid, Dehghantanha, Ali, Udzir, Nur Izura, Damshenas, Mohsen |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30588/ http://psasir.upm.edu.my/id/eprint/30588/1/Cyber%20warfare%20trends%20and%20future.pdf |
Similar Items
Cyber warfare: a new type of combat
by: Hossain, Ishtiaq
Published: (2014)
by: Hossain, Ishtiaq
Published: (2014)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Cyberspace: the warfare domain
by: Songip, Ahmad Rahman, et al.
Published: (2013)
by: Songip, Ahmad Rahman, et al.
Published: (2013)
Russia and "hybrid warfare"
by: Renz, Bettina
Published: (2016)
by: Renz, Bettina
Published: (2016)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Defamation in the cyber age: the emerging trends
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Germ Warfare and the Zero-Sum Game
by: Abd Razak, Dzulkifli
Published: (1995)
by: Abd Razak, Dzulkifli
Published: (1995)
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
Vicarious warfare and dynamic efficiency of companies in the aerospace and defence industry
by: Nourani, Mohammad, et al.
Published: (2020)
by: Nourani, Mohammad, et al.
Published: (2020)
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
The image of Islamic jihad and prophet's warfare in the west between myth and reality
by: Osmani, Noor Mohammad
Published: (2012)
by: Osmani, Noor Mohammad
Published: (2012)
Towards a new model for information warfare / Abdulrahman R. Alazmi
by: R. Alazmi, Abdulrahman
Published: (2014)
by: R. Alazmi, Abdulrahman
Published: (2014)
A bear’s biography: hybrid warfare and the more-than-human battlespace
by: Forsyth, Isla
Published: (2016)
by: Forsyth, Isla
Published: (2016)
Ezekiel's oracles against the nations in light of a royal ideology of warfare
by: Crouch, C.L.
Published: (2011)
by: Crouch, C.L.
Published: (2011)
Host-multi pathogen-warfare: Pathogen interactions in co-infected plants
by: Abdullah, A., et al.
Published: (2017)
by: Abdullah, A., et al.
Published: (2017)
Malaysia's civilian information warfare defense capability / Mokhzani b. Zubir
by: Zubir, Mokhzani
Published: (2003)
by: Zubir, Mokhzani
Published: (2003)
Design of modified microwave power divider for radar electronic warfare transceiving system
by: Mat Din, Amir Rudin
Published: (2007)
by: Mat Din, Amir Rudin
Published: (2007)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
The plasma focus-trending into the future
by: Lee, S., et al.
Published: (2012)
by: Lee, S., et al.
Published: (2012)
SAU 216E - GLOBALIZATION CYBER CULTURE AND FUTURE STUDIES APRIL 08.
by: PPSKM, Pusat Pengajian Sains Kemasyarakatan
Published: (2008)
by: PPSKM, Pusat Pengajian Sains Kemasyarakatan
Published: (2008)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Economic warfare : are we vulnerable? / Farah Zamira Farush Khan and Anitawati Mohd Lokman
by: Farush Khan, Farah Zamira, et al.
Published: (2014)
by: Farush Khan, Farah Zamira, et al.
Published: (2014)
Warfare, social organisation and resource access amongst the Wosera Abelam of Papua New Guinea
by: Curry, George
Published: (1997)
by: Curry, George
Published: (1997)
Media warfare content analysis of the conservative and alternative media during the Bukit Selambau Malaysian by-election.
by: Sajahan, Mohamed Samsudeen, et al.
Published: (2010)
by: Sajahan, Mohamed Samsudeen, et al.
Published: (2010)
Blockchain technology in the healthcare industry: trends and opportunities
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
States, trends, and future of aquaponics research
by: Hao, Yilong, et al.
Published: (2020)
by: Hao, Yilong, et al.
Published: (2020)
Similar Items
-
Cyber warfare: a new type of combat
by: Hossain, Ishtiaq
Published: (2014) -
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014) -
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019) -
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013) -
Cyberspace: the warfare domain
by: Songip, Ahmad Rahman, et al.
Published: (2013)