Browse Results

Showing 15,151 through 15,175 of 61,884 results

Cyberspace Simulation and Evaluation: Third International Conference, CSE 2024, Shenzhen, China, November 26–28, 2024, Proceedings, Part II (Communications in Computer and Information Science #2421)

by Wanlei Zhou Yanchun Zhang Jiawei Zhang Yan Jia Guangxia Xu

This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26–28, 2024. The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: - Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario. Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation. Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.

Cyberspace Simulation and Evaluation: Third International Conference, CSE 2024, Shenzhen, China, November 26–28, 2024, Proceedings, Part III (Communications in Computer and Information Science #2422)

by Wanlei Zhou Yanchun Zhang Jiawei Zhang Yan Jia Guangxia Xu

This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26–28, 2024. The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: - Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario. Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation. Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.

Cyberspace and Cybersecurity (Second Edition)

by George Kostopoulos

Providing comprehensive coverage of cyberspace and cyber security, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cyber security as an added value, ransomware defense, review of recent cyber laws, new types of cyber crime, plus new chapters on digital currencies and encryption key management.

Cyberspace and International Relations: Theory, Prospects and Challenges

by Jan-Frederik Kremer Benedikt Müller

Cyberspace is everywhere in today's world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the "cyberization" of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations.

Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

by Reza Montasari

This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book’s exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI’s transformative role in shaping the future of national and international security.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the in

Cyberspace, Data Analytics, and Policing

by David Skillicorn

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad – collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Cyberspace: Risks and Benefits for Society, Security and Development (Advanced Sciences and Technologies for Security Applications)

by J. Martín Ramírez Luis A. García-Segura

This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production. Cyberspace is analyzed from quite different and interdisciplinary perspectives, such as: conceptual and legal, military and socio-civil, psychological, commercial, cyber delinquency, cyber intelligence applied to public and private institutions, as well as the nuclear governance.

Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism

by Michael Miller

The news is filled with stories of data breaches at companies and of threats to national security as hackers interfere with elections. It's more important than ever for internet users to know how to maintain their privacy online. The digital world has become inescapable, and to be a responsible digital citizen, it is necessary to be aware of the threats to your online privacy and security. This book looks at the legal and illegal forms of cyberspying, goes behind the scenes to explore career paths in cyberintelligence, and looks at the digital threats of cyber propaganda, fake news, cyberterrorism, and threats to the US government and individuals. Readers will learn tools to keep themselves safe and protect their privacy, as well as tips for what to do if they are attacked online, and a final chapter looks at how digitally savvy teens can prepare for a career in cyberintelligence.

Cyberspy (Tom Clancy's Net Force Explorers #6)

by Tom Clancy Steve Pieczenik Bill Mccay

The inside secrets of big business are being leaked onto the Net. But the culprit is not just a kid hacker showing off. It's a cadre of spies who are using a revolutionary, new "wearable" computer to tune in to people's thoughts. And Net Force Explorer David Gray must try to keep the people he works with -- and his friends -- from being fatally crushed by the unknown spies...

Cyberstrategien für Unternehmen und Behörden

by Michael Bartsch Stefanie Frey

Die Autoren beschreiben in diesem Buch, wie eine Cybersicherheitsstrategie entwickelt und umgesetzt wird. Dabei beleuchten sie die geopolitischen Einflüsse wie auch die organisatorischen und technischen Rahmenbedingungen. Cyberrisiken entstehen durch den Einsatz von Informationstechnologien, beinhalten aber auch organisatorische und technische Risiken und sind somit nicht nur ein Problem der IT-Abteilung, sondern der Unternehmensleitung. Eine Cyberstrategie sollte daher ein Teil der Unternehmensstrategie sein und nicht nur ein Teil der IT-Strategie.Die staatliche und die unternehmerische Sicherheitsvorsorge werden bei der Cyberproblematik immer enger zusammenarbeiten müssen. Nur so können Wirtschafträume im Cyberspace langfristig gesichert werden.

Cybertax: Managing the Risks and Results (IT Pro Practice Notes)

by James Ransome George K. Tsantes

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C’s for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Cyberterrorism: Understanding, Assessment, and Response

by Thomas M. Chen Lee Jarvis Stuart Macdonald

This is the first book to present a multidisciplinary approach to cyberterrorism It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.

Cyberthreats and the Decline of the Nation-State: Cyberthreats And The Decline Of The Nation-state (Routledge Research in Information Technology and E-Commerce Law)

by Susan W. Brenner

This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.

Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

by Edward J. Appel

Researching an individual‘s, firm‘s or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence.

Cyberville: Clicks, Culture, and the Creation of an Online Town

by Stacy Horn

A look at ECHO, one of the original on-line communities.

Cyberwar and Information Warfare (Wiley-iste Ser.)

by Daniel Ventre

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, geopolitics, information technologies, etc.

Cyberwar and Revolution: Digital Subterfuge in Global Capitalism

by Svitlana Matviyenko Nick Dyer-Witheford

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

Cyberwarfare: Information Operations in a Connected World

by David Seidl Mike Chapple

Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations–operations in which it has become almost impossible to separate cyberwarfare from traditional warfare.

Cyberwarfare: Threats to Critical Infrastructure (Palgrave Studies in Cybercrime and Cybersecurity)

by Kristan Stoddart

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).

Cyberwars in the Middle East (War Culture)

by Ahmed Al-Rawi

Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.

Cyborg Citizen: Politics in the Posthuman Age

by Chris Hables Gray

The growing synergy of humans and technology--from dialysis to genetically altered foods to PET scans--is transforming how we view our minds and our bodies. But how has it changed the body politic? How can we forge a society that protects the rights of human and cyborg alike?The creator of the cult classic Cyborg Handbook, Chris Hables Gray, now offers the first guide to "posthuman" politics, framing the key issues that could threaten or brighten our technological future. For good or ill, politics has already been cyborged in ways that touch us all: On-line voting promises to change who participates. Wars are won on video screens. Biotechnological advances-- cloning, sexual prostheses, gene patents--are redefining life, death, and family in ways that strain the social contract. In the face of these advances, visions of the cyborg future range from the utopian to the nightmarish, from a spiritual super-race transcending the body's confines to a soulless Borg consuming human individuality.Only with a broad, historically rich and ethically grounded understanding of these issues, Gray argues, can we combat the threats to our freedom and even our survival. A work of vision and imagination, Cyborg Citizen lays the groundwork for the participatory evolution of our society.

Cyborg Futures: Cross-disciplinary Perspectives on Artificial Intelligence and Robotics (Social and Cultural Studies of Robots and AI)

by Teresa Heffernan

This volume brings together academics from evolutionary biology, literary theory, robotics, digital culture, anthropology, sociology, and environmental studies to consider the impact of robotics and AI on society. By bringing these perspectives together in one book, readers gain a sense of the complex scientific, social, and ideological contexts within which AI and robotics research is unfolding, as well as the illusory suppositions and distorted claims being mobilized by the industry in the name of bettering humanity’s future. Discussions about AI and robotics have been shaped by computer science and engineering, steered by corporate and military interests, forged by transhumanist philosophy and libertarian politics, animated by fiction, and hyped by the media. From fiction passing as science to the illusion of AI autonomy to the business of ethics to the automation of war, this collection recognizes the inevitable entanglement of humanity and technology, while exposing the problematic assumptions and myths driving the field in order to better assess its risks and potential.

Cyclonic Disasters and Resilience: An Empirical Study on South Asian Coastal Regions (Advances in Geographical and Environmental Sciences)

by R. B. Singh Anupama Dubey Ashutosh Mohanty

The Bay of Bengal is prone to tropical cyclones and storm surges as a result of its location, and many of the mostly poor people living along the coastal regions of South Asia lose their lives almost every year. These disasters have been particularly devastating and have caused serious damage. During the past five decades, the low-lying coastal and offshore islands have experienced a tragic history of 50 severe cyclones and storm surges, with more than one million victims dead or missing. People accepted and waited for the next disaster as they had no alternatives. Members of the poor families who survived the disasters experienced hard times recovering from damage and the loss of their loved ones. After disasters, epidemic diseases arise in the affected areas. Many of the people in distress are also deprived of public services. Providing all sorts of assistance and emergency health preparedness are most essential to overcome such a situation. The causes of these huge casualties have been mainly: (1) the high population density of costal settlements, (2) inadequate cyclone shelters in the disaster risk areas, (3) lack of awareness of the disaster risk by the vulnerable population, (4) deterministic attitudes of people who accept disasters as “fate”, (5) houses that are weakly constructed and (6) underdeveloped central awareness programmes and weather forecast systems. This book is based on an empirical study presenting a timeline analysis of major cyclones and their impacts and consequent losses through the super-cyclones in the disaster-prone coastal regions of India, Sri Lanka and Bangladesh. This study also investigates resilience mechanisms based on early warning systems, technology applications including GIS and remote sensing, best practices, success stories and case studies that can be used for effective cyclone management and development of a resilience mechanism among coastal communities.

Cyprus and its Conflicts: Representations, Materialities, and Cultures

by Nico Carpentier Vaia Doudaki

The Mediterranean island of Cyprus is the site of enduring political, military, and economic conflict. This interdisciplinary collection takes Cyprus as a geographical, cultural and political point of reference for understanding how conflict is mediated, represented, reconstructed, experienced, and transformed. Through methodologically diverse case studies of a wide range of topics—including public art, urban spaces, and print, broadcast and digital media—it assembles an impressively multifaceted perspective, one that provides broad insights into the complex interplay of culture, conflict, and identity.

Cython: A Guide for Python Programmers

by Kurt W. Smith

Build software that combines Python’s expressivity with the performance and control of C (and C++). It’s possible with Cython, the compiler and hybrid programming language used by foundational packages such as NumPy, and prominent in projects including Pandas, h5py, and scikits-learn. In this practical guide, you’ll learn how to use Cython to improve Python’s performance—up to 3000x— and to wrap C and C++ libraries in Python with ease.Author Kurt Smith takes you through Cython’s capabilities, with sample code and in-depth practice exercises. If you’re just starting with Cython, or want to go deeper, you’ll learn how this language is an essential part of any performance-oriented Python programmer’s arsenal.Use Cython’s static typing to speed up Python codeGain hands-on experience using Cython features to boost your numeric-heavy PythonCreate new types with Cython—and see how fast object-oriented programming in Python can beEffectively organize Cython code into separate modules and packages without sacrificing performanceUse Cython to give Pythonic interfaces to C and C++ librariesOptimize code with Cython’s runtime and compile-time profiling toolsUse Cython’s prange function to parallelize loops transparently with OpenMP

Refine Search

Showing 15,151 through 15,175 of 61,884 results