?
“Comment vraiment paralyser un pays à l’aide du cyber”
Les Cahiers de la Revue de Défense Nationale "Penser autrement". 2015. P. 103-110.
Filiol E. A.
Language:
French
Keywords: cyber security
Berlin : Springer, 2013
This volume contains the papers selected for presentation at the 18th European Symposium on Research in Computer Security (ESORICS 2013), held during September 9–13, 2013, in Egham, UK. In response to the symposium’s call for papers, 242 papers were submitted to the conference from 38 countries. These papers were evaluated on the basis of their ...
Added: March 24, 2015
Linton J.D., Boyson S., Aje J., Technovation 2014 Vol. 34 No. 7 P. 339-341
The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private sector to better understand the myriad of cyber challenges, identifying existing gaps and needs and closing these gaps as ...
Added: December 16, 2014
Linton J.D., Boyson S., Aje J., Technovation 2014 Vol. 34 No. 7 P. 339-341
The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private sector to better understand the myriad of cyber challenges, identifying existing gaps and needs and closing these gaps as ...
Added: June 11, 2014
L. : Springer, 2015
4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ...
Added: November 4, 2015
Scedrov A., Barthe G., Fagerholm E. et al., , in : Public-Key Cryptography -- PKC 2015. Vol. 9020.: Berlin : Springer, 2015. P. 355-376.
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the number of group elements needed in the verification key and the signature, and the number of pairing-product equations in the verification algorithm. While the size of keys and signatures is crucial for many applications, another important aspect to consider for performance ...
Added: November 4, 2015
Grishunin S., Suloeva S., Egorova A. et al., , in : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. 19th International Conference, NEW2AN 2019, and 12th Conference, ruSMART 2019, St. Petersburg, Russia, August 26–28, 2019, Proceedings. Issue 11660.: Switzerland : Springer, 2019. P. 481-494.
We developed the mechanism of assessing cyber risks for Internet of Things (IoT) projects. The relevance of this topic is explained by growing sophistication of cyber-attacks, the speed of new threats emergence and increasing damage from the attacks. The paper addresses decreasing efficiencies of existing mechanisms of cyber risk assessment and fills the research gaps ...
Added: October 26, 2019
Феста Ю. Ю., Воробьев И. А., Model Assisted Statistics and Applications 2022 Vol. 17 No. 1 P. 41-49
We currently see a large increase in e-commerce sector; it is becoming a central trend in the banking industry. Fraudsters keep up with modern technologies, and use weak points in human psychology and security systems to steal money from regular users. To ensure the required level of security, banks began to apply artificial intelligence in ...
Added: April 13, 2022
Timofeyev Y., Dremova O., International Journal of Law, Crime and Justice 2022 Vol. 68 Article 100520
This study aims to identify effective responses to cyber crime in the insurance industry. Survey responses from Moscow-based employees holding key positions in the leading insurance companies have been collected. The study analyses awareness of, attitudes to, and approaches to cyber security, as well as the incidence and impact of breaches or attacks. According to ...
Added: November 19, 2021
Бражник Т.А., Zhuravlev M., Hudiaeva E., Информационное право 2014 № 4 С. 18-23
The article reviews the main events of the Third International Summer School on Cyber Law, organized by the Laboratory of information law (National Research University Higher School of Economics, Russia).
This year applications for participation in the summer school were submitted from the UK, Italy, Germany, Slovakia, Armenia, India, Belarus, Kyrgyzstan and from different cities of ...
Added: September 20, 2014
Baku : Publishing Department of Qafqaz University, 2016
Added: November 5, 2016
Grishunin S., Сулоева С. Б., Бурова Е. Е., , in : SPBPU IDE '19: Proceedings of the 2019 International SPBPU Scientific Conference on Innovations in Digital Economy. : NY, United States of America : Association for Computing Machinery (ACM), 2019. Ch. 21. P. 1-6.
The paper is dedicated to developing a system for identifying and assessing cyber-risks to support investment decision-making in a machine industry enterprise. It is designed for projects related to high-tech equipment development and introduction. The problem is acute because the existing methods of cyber-risk analysis have some drawbacks, which prevent them from being used at ...
Added: March 25, 2020
Timofeyev Y., Skidmore M., , in : The Handbook of Security, 3rd ed. : Palgrave Macmillan, 2022. Ch. 12. P. 239-260.
Added: April 24, 2021
Денисова А. В., Бортников С. П., , in : Current Achievements, Challenges and Digital Chances of Knowledge Based Economy. : Springer, 2021. P. 851-856.
All branches of law are constantly under the influence of the social environment, especially national politics and economy, and therefore the author has set the goal of studying the impact of the development processes of the digital economy of the Russian Federation on the Russian criminal law as an important component of cyber security. The ...
Added: October 31, 2022
Денисов Д. В., Прикладная информатика 2019 Т. 14 № 2 С. 89-104
In modern conditions of blurring the boundaries between the virtual and the real world, as well as the transition of virtual threats into reality, the issues of user security on the Internet are becoming increasingly important. This is especially true for children and adolescents who are at high risk because of their young age, lack ...
Added: September 25, 2019
Elin V., М. : Московский институт государственного управления и права, 2017
Added: January 31, 2017
ACM, 2018
It is our great pleasure to welcome you to the Fourth ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) in conjunction with the 25th ACM Conference on Computer and Communications Security (CCS) in Toronto, Canada.
Our increased dependency on cyber-physical systems (CPS) has amplified concerns of cyber attacks on these systems. These transformative attack methods ...
Added: November 10, 2018
IEEE, 2020
Added: October 22, 2020
Kanovich M., Ban Kirigin T., Nigam V. et al., Information and Computation 2014 No. 238 P. 233-261
In a collaborative system, the agents collaborate to achieve a common goal, but they are not willing to share some sensitive private information.
The question is how much damage can be done by a malicious participant sitting inside the system.
We assume that all the participants (including internal adversaries) have bounded memory – at any moment, they ...
Added: March 23, 2015
Baku : The Institute of Electrical and Electronics Engineering, Inc., 2019
The IEEE 13th International Conference on Application of Information and Communication Technologies (AICT2019) will be held in Baku, Azerbaijan on the 23, 24 and 25th of October 2019. The AICT2019 is organized by the ADA University, Institute of Information Technology of ANAS, University Malaysia Sabah with support of IEEE Azerbaijan Joint Chapter and technically sponsored ...
Added: December 18, 2019
Kanovich M., Scedrov A., Kirigin T. B. et al., , in : 4th Conference on Principles of Security and Trust (POST 2015). Vol. 9036.: L. : Springer, 2015. P. 259-279.
Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as ...
Added: November 4, 2015
Sokolov A., Mesropyan V. R., Chulok A., Technovation 2014 Vol. 34 No. 7 P. 389-391
Development of information and communication technologies (ICT) is a key aspect of modernising the Russian economy. Russia is gradually approaching developed countries in terms of ICT infrastructure and Internet access. Along with opportunities opened by the rapid development and proliferation of ICT, systemic threats to security of critical components of public and private infrastructures are ...
Added: February 6, 2014
Romanyuk K., , in : Intelligent Computing: Proceedings of the 2021 Computing Conference. Vol. 2.: Springer, 2021. P. 221-231.
Credit risk analysis is essential in banking, and it relies on data. Multiple novel types of data are getting more popular for credit risk analysis in the consumer lending sector. On the one hand, the application of big data can increase the predictive power of credit risk analysis and reduce information asymmetry in the consumer ...
Added: October 27, 2021
Grishunin Sergei V., Пищалкина И. И., Сулоева С. Б., Научно-технические ведомости Санкт-Петербургского государственного политехнического университета. Экономические науки 2021 Т. 14 № 6 С. 102-116
The Internet of Things (IoT) opens up vast opportunities for innovation, ranging from industrial enterprises to healthcare and consumers. However, the development of Internet of Things projects creates significant risks for developers and users. The number and frequency of IoT attacks is increasing, while the direct and indirect damage are on the rise. Thus, one ...
Added: June 22, 2022
М. : Территория лизинга, 2013
Added: May 16, 2014