首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
From Provoking Emotions to fake Images: The Recurring Signs of fake news and Phishing Scams Spreading on Social Media in Hungary, Romania and Slovakia 从煽情到假图片:假新闻和网络钓鱼诈骗在匈牙利、罗马尼亚和斯洛伐克的社交媒体上反复出现的迹象
Pub Date : 2023-07-04 DOI: 10.34190/eccws.22.1.1547
Kenyeres Attila Zoltán, Lauren Weigand
The phenomenon of fake news and media manipulation has always existed in human history, long before the invention of digital technology. However, never before in the history of mankind has it been possible to spread fake news so quickly, in such large quantities and to such large masses, as now, in the age of the internet and social media. In this paper we identified 31 recurring signs of fake news and phishing scams spreading on social media in Hungary, Romania and Slovakia, based on the content analysis of 866 screenshots of social media posts, internet articles, phishing emails and SMS messages from these 3 countries. The most common group of signs are signs of provoking emotions. The second largest group of indicators include the characteristics of the media publishing the news. The third major category is the visual appearance and wording of the news. The fourth group of recurring signs refers to the original source of the news. The fifth group of indicators is the lack of reliable and/or official media coverage of the story. The elements of the sixth group of signs are the photoshopped and re-framed 'proof' images and videos that appear in the news. The seventh, and final group, of indicators refers to the prior beliefs and biases of the target audience. Provoking emotions, and thereby turning off the recipient's critical thinking, is the most common sign of fake news, scams and other hoaxes. Consequently, there is a great need for a high level of critical thinking and information literacy regarding social media contents on the part of the recipient. Our research was based on a fake news database collected in the framework of an international Erasmus+ project called "Media Detective". The aim of the project is to develop media literacy training modules for teachers and youth workers that could be used in school settings.
假新闻和媒体操纵现象在人类历史上一直存在,早在数字技术发明之前。然而,在人类历史上,从来没有像现在这样,在互联网和社交媒体时代,假新闻传播得如此之快,数量如此之大,受众如此之广。在本文中,我们根据对来自这三个国家的866张社交媒体帖子、互联网文章、网络钓鱼电子邮件和短信的截图的内容分析,确定了匈牙利、罗马尼亚和斯洛伐克社交媒体上传播的31个假新闻和网络钓鱼诈骗的反复出现的迹象。最常见的一组信号是引发情绪的信号。第二大指标组包括新闻发布媒体的特征。第三大类是新闻的视觉外观和措辞。第四组重复出现的符号是指新闻的原始来源。第五组指标是缺乏可靠和(或)官方媒体对事件的报道。第六组标志的元素是新闻中出现的经过ps和重新装裱的“证明”图像和视频。第七组,也是最后一组指标,是指目标受众的先验信念和偏见。激发情绪,从而关闭收件人的批判性思维,是假新闻、骗局和其他骗局最常见的迹象。因此,接受者非常需要对社交媒体内容具有高水平的批判性思维和信息素养。我们的研究基于一个假新闻数据库,该数据库是在一个名为“媒体侦探”的国际伊拉斯谟+项目框架内收集的。该项目的目的是为教师和青年工作者开发可在学校环境中使用的媒体素养培训模块。
{"title":"From Provoking Emotions to fake Images: The Recurring Signs of fake news and Phishing Scams Spreading on Social Media in Hungary, Romania and Slovakia","authors":"Kenyeres Attila Zoltán, Lauren Weigand","doi":"10.34190/eccws.22.1.1547","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1547","url":null,"abstract":"The phenomenon of fake news and media manipulation has always existed in human history, long before the invention of digital technology. However, never before in the history of mankind has it been possible to spread fake news so quickly, in such large quantities and to such large masses, as now, in the age of the internet and social media. In this paper we identified 31 recurring signs of fake news and phishing scams spreading on social media in Hungary, Romania and Slovakia, based on the content analysis of 866 screenshots of social media posts, internet articles, phishing emails and SMS messages from these 3 countries. The most common group of signs are signs of provoking emotions. The second largest group of indicators include the characteristics of the media publishing the news. The third major category is the visual appearance and wording of the news. The fourth group of recurring signs refers to the original source of the news. The fifth group of indicators is the lack of reliable and/or official media coverage of the story. The elements of the sixth group of signs are the photoshopped and re-framed 'proof' images and videos that appear in the news. The seventh, and final group, of indicators refers to the prior beliefs and biases of the target audience. Provoking emotions, and thereby turning off the recipient's critical thinking, is the most common sign of fake news, scams and other hoaxes. Consequently, there is a great need for a high level of critical thinking and information literacy regarding social media contents on the part of the recipient. Our research was based on a fake news database collected in the framework of an international Erasmus+ project called \"Media Detective\". The aim of the project is to develop media literacy training modules for teachers and youth workers that could be used in school settings.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126327978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spreading Lies Through the Cyber Domain 通过网络领域传播谎言
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1082
Thomas A. Dempsey
The expansion of Information Operations (IO) over the past ten years has allowed individuals and groups to increase their sphere of influence on a global scale. Nation-state cyber threat actors have increased their presence on social media, building out false personas to influence large populations. This type of activity is difficult to stop due to the availability of social networks on the internet and the ease of creating false personas that can’t be directly attributed to the actor. IO activity has been observed with the Russian cyber activity during the 2016 U.S. Presidential elections and from Russian social media campaigns provoking extremist groups and attempting to cause physical harm, such as the 2017 campaign on Facebook to start a rally and a simultaneous counter rally in front of the Islamic Da’wah Centre of Houston. Although Russia has been observed leveraging this capability, they are not the only global actor in the cyber domain taking advantage of IO. Global threat actors have leveraged social media platforms and blogs to influence the global population and spread propaganda. This type of activity has been seen within traditional warfare using propaganda techniques. With the introduction of the cyber domain into warfare, there is an increased ability to communicate not only to one population but to the global community with the intent to manipulate the masses using IO. This paper examines the Cybersecurity Operations (CO) that have been observed utilizing IO and the psychological impacts they have had in successful campaigns against the United States. This paper argues that with increased influence capabilities in the cyber domain, individuals and groups will continue using IO to support tactical and strategic objectives. Through the available literature, this paper examines the impacts that IO has had on the United States through attempts to manipulate elections and create divides in the nation over the last ten years. This paper leverages the psychology of group processes to analyze the literature involving social media campaigns and the influencing of groups through the lens of social identity theory to provide new insight into mitigating and countering IO.
过去十年来,信息行动的扩大使个人和团体能够在全球范围内扩大其影响范围。民族国家的网络威胁行为者增加了他们在社交媒体上的存在,建立了虚假的角色来影响大量人口。这种类型的活动很难停止,因为互联网上有社交网络,而且很容易创造出不能直接归因于演员的虚假角色。在2016年美国总统大选期间,我们观察到俄罗斯的网络活动,以及俄罗斯在社交媒体上煽动极端主义团体并试图造成人身伤害的活动,例如2017年在Facebook上发起集会的活动,以及在休斯敦伊斯兰达瓦中心前同时举行的反集会。虽然俄罗斯已经被观察到利用这种能力,但他们并不是网络领域唯一利用IO的全球参与者。全球威胁行为者利用社交媒体平台和博客来影响全球人口并传播宣传。这种类型的活动在使用宣传技术的传统战争中已经看到。随着网络领域引入战争,不仅与一个人口,而且与全球社区进行通信的能力增强,意图使用IO操纵大众。本文研究了利用IO观察到的网络安全行动(CO),以及它们在针对美国的成功战役中产生的心理影响。本文认为,随着网络领域影响力的增强,个人和团体将继续使用IO来支持战术和战略目标。通过现有文献,本文考察了在过去十年中,国际劳工组织通过试图操纵选举和制造国家分裂对美国产生的影响。本文利用群体过程心理学,通过社会认同理论的视角来分析涉及社交媒体活动和群体影响的文献,为减轻和对抗IO提供新的见解。
{"title":"Spreading Lies Through the Cyber Domain","authors":"Thomas A. Dempsey","doi":"10.34190/eccws.22.1.1082","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1082","url":null,"abstract":"The expansion of Information Operations (IO) over the past ten years has allowed individuals and groups to increase their sphere of influence on a global scale. Nation-state cyber threat actors have increased their presence on social media, building out false personas to influence large populations. This type of activity is difficult to stop due to the availability of social networks on the internet and the ease of creating false personas that can’t be directly attributed to the actor. IO activity has been observed with the Russian cyber activity during the 2016 U.S. Presidential elections and from Russian social media campaigns provoking extremist groups and attempting to cause physical harm, such as the 2017 campaign on Facebook to start a rally and a simultaneous counter rally in front of the Islamic Da’wah Centre of Houston. Although Russia has been observed leveraging this capability, they are not the only global actor in the cyber domain taking advantage of IO. Global threat actors have leveraged social media platforms and blogs to influence the global population and spread propaganda. This type of activity has been seen within traditional warfare using propaganda techniques. With the introduction of the cyber domain into warfare, there is an increased ability to communicate not only to one population but to the global community with the intent to manipulate the masses using IO. This paper examines the Cybersecurity Operations (CO) that have been observed utilizing IO and the psychological impacts they have had in successful campaigns against the United States. This paper argues that with increased influence capabilities in the cyber domain, individuals and groups will continue using IO to support tactical and strategic objectives. Through the available literature, this paper examines the impacts that IO has had on the United States through attempts to manipulate elections and create divides in the nation over the last ten years. This paper leverages the psychology of group processes to analyze the literature involving social media campaigns and the influencing of groups through the lens of social identity theory to provide new insight into mitigating and countering IO.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116950330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing Robust Cyber Warfare Capabilities for the African Battlespace 为非洲战场发展强大的网络作战能力
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1105
J. Mtsweni, Mphahlela Thaba
The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and effectively. Developing cyber warfare capabilities remains a challenge to many African militaries who are struggling to remain afloat due to ever decreasing resources, including budgets. This in turn reduces the effect of these militaries in the evolving battlespace. This paper seeks to present a comprehensive framework for developing cyber warfare capabilities for African militaries to be able to operate efficiently in the cyber battlespace. The proposed POSTEDFIT aligned framework, requires a comprehensive system thinking approach towards developing capabilities in a phased manner. This includes the ability to define the capabilities in terms of the requirements presented by the cyberspace, and the components forming these capabilities. The generic framework is based on the basic understanding of a capability, as the ability to do something, in this case, the ability to secure and operate in the cyberspace for African militaries, ability to conduct offensive cyber operations and ability to keep abreast with the evolving cyber battlespace.
非洲战场空间的技术发展继续对非洲军队构成重大挑战。这种演变增加了非洲军队能够在网络空间进行战略和有效行动的需求。发展网络战能力对许多非洲军队来说仍然是一个挑战,由于包括预算在内的资源不断减少,他们正在努力维持生存。这反过来又降低了这些军队在不断变化的战场空间中的作用。本文旨在提出一个全面的框架,以发展非洲军队的网络战能力,使其能够在网络战斗空间中有效地运作。拟议的postdfit一致框架需要一种全面的系统思维方法,以分阶段的方式开发能力。这包括根据网络空间提出的需求定义功能的能力,以及形成这些功能的组件的能力。通用框架是基于对能力的基本理解,作为做某事的能力,在这种情况下,为非洲军队在网络空间保护和运作的能力,进行进攻性网络行动的能力以及与不断发展的网络战斗空间保持同步的能力。
{"title":"Developing Robust Cyber Warfare Capabilities for the African Battlespace","authors":"J. Mtsweni, Mphahlela Thaba","doi":"10.34190/eccws.22.1.1105","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1105","url":null,"abstract":"The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and effectively. Developing cyber warfare capabilities remains a challenge to many African militaries who are struggling to remain afloat due to ever decreasing resources, including budgets. This in turn reduces the effect of these militaries in the evolving battlespace. This paper seeks to present a comprehensive framework for developing cyber warfare capabilities for African militaries to be able to operate efficiently in the cyber battlespace. The proposed POSTEDFIT aligned framework, requires a comprehensive system thinking approach towards developing capabilities in a phased manner. This includes the ability to define the capabilities in terms of the requirements presented by the cyberspace, and the components forming these capabilities. The generic framework is based on the basic understanding of a capability, as the ability to do something, in this case, the ability to secure and operate in the cyberspace for African militaries, ability to conduct offensive cyber operations and ability to keep abreast with the evolving cyber battlespace.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal Response to Social Media Disinformation on National Level 国家层面对社交媒体虚假信息的法律回应
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1106
M. Watney
Social media has an enormous impact on the manner in which society communicates and shares information. Digital is no longer a supplementary channel, but is the first place most people go to for news, information and communication. The transmission of social media disinformation has increased dramatically across the world and it necessitates a response. The discussion focuses on the response to social media disinformation on a national level. The discussion does not focus on foreign state or state-sponsored actors of misinformation. The focus and publicity may - within the context of cybersecurity - predominantly have been on cyberattacks, such as ransomware attacks. However, recent incidents - unrelated to foreign state interference and cyberattacks - illustrate that cybersecurity law must encompass the threat of disinformation. The 2020 COVID-19 pandemic, 2021 Washington, DC, United States, and South African as well as the 2023 Brazil riots illustrate the harmfulness of social media disinformation. Cognisance should be taken of the lessons learnt from the examples of social media disinformation as it may assist in determining a response to disinformation. There are various responses to national social media disinformation, such as legislative social media platform regulation, censorship, and criminalisation of the disinformation by itself. The response within the context of a cybersecurity threat landscape necessitates scrutiny as the response may impact on human rights. The trade-off between security and human right protection may be the violation of human rights to prevent harm from disinformation. 
社交媒体对社会交流和分享信息的方式产生了巨大的影响。数字媒体不再是一个辅助渠道,而是大多数人获取新闻、信息和交流的首选渠道。社交媒体上虚假信息的传播在世界范围内急剧增加,这需要做出回应。讨论的重点是在国家层面上对社交媒体虚假信息的反应。讨论的重点不是外国政府或国家支持的虚假信息行为者。在网络安全的背景下,重点和宣传可能主要集中在网络攻击上,比如勒索软件攻击。然而,最近发生的与外国干涉和网络攻击无关的事件表明,网络安全法必须包括虚假信息的威胁。2020年2019冠状病毒病大流行、2021年美国华盛顿特区和南非以及2023年巴西骚乱都说明了社交媒体虚假信息的危害性。应从社交媒体虚假信息的例子中吸取教训,因为这可能有助于确定对虚假信息的反应。对国家社交媒体虚假信息有各种各样的回应,例如立法社交媒体平台监管,审查和虚假信息本身的刑事定罪。在网络安全威胁环境下的应对措施需要仔细审查,因为应对措施可能会影响人权。安全与人权保护之间的权衡可能是侵犯人权以防止虚假信息的伤害。
{"title":"Legal Response to Social Media Disinformation on National Level","authors":"M. Watney","doi":"10.34190/eccws.22.1.1106","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1106","url":null,"abstract":"Social media has an enormous impact on the manner in which society communicates and shares information. Digital is no longer a supplementary channel, but is the first place most people go to for news, information and communication. The transmission of social media disinformation has increased dramatically across the world and it necessitates a response. The discussion focuses on the response to social media disinformation on a national level. The discussion does not focus on foreign state or state-sponsored actors of misinformation. The focus and publicity may - within the context of cybersecurity - predominantly have been on cyberattacks, such as ransomware attacks. However, recent incidents - unrelated to foreign state interference and cyberattacks - illustrate that cybersecurity law must encompass the threat of disinformation. The 2020 COVID-19 pandemic, 2021 Washington, DC, United States, and South African as well as the 2023 Brazil riots illustrate the harmfulness of social media disinformation. Cognisance should be taken of the lessons learnt from the examples of social media disinformation as it may assist in determining a response to disinformation. There are various responses to national social media disinformation, such as legislative social media platform regulation, censorship, and criminalisation of the disinformation by itself. The response within the context of a cybersecurity threat landscape necessitates scrutiny as the response may impact on human rights. The trade-off between security and human right protection may be the violation of human rights to prevent harm from disinformation.\u0000 ","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Participants Prefer Technical Hands-on Cyber Exercises Instead of Organisational and Societal Ones 参与者更喜欢技术实践的网络练习,而不是组织和社会的练习
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1196
Jani Päijänen, J. Salonen, A. Karinsalo, T. Sipola, T. Kokkonen
The current shortage of cybersecurity professionals is about 2 million people worldwide, and in Europe the industry is seeking for about 350 000 skilled professionals. There is also an enormous need for dedicated cybersecurity training courses for existing professionals who wish to acquire completely new skills or maintain their current ones. Due to the lack of new skilled workforce, the current cybersecurity personnel are overworked in their work. In order not to waste the valuable time of cybersecurity professionals with unnecessary training, cyber exercises should be well prepared. This article is based on research conducted in a European collaborative project and more specifically, a cyber exercise organised in early 2022. The purpose of our research was to conduct a preliminary assessment of the participants to learn about their skills and expectations before the cyber exercise. This assessment was used for fine-tuning the exercise. To achieve this, we identified common trends in the participants’ interests during the cyber exercise. The preliminary assessment was carried out as a web survey. The responses were cross tabulated to find meaningful indicators related to skills and interests of the participant group. We identified the most and least preferred knowledge areas for both the industry and public sector participants. Our findings show that the most interesting knowledge areas of all respondents were primarily technical in nature (Data Security, Connection Security, System Security), but Organisational Security was also reported.  The least interesting knowledge areas were mostly non-technical in nature (Human Security, Organisational Security, Societal Security) but also Component Security was reported. We also enquired about the preferred team size. The majority of the respondents preferred a team size of three to four persons. The preferred single session duration was 46–60 minutes. The results help cybersecurity professionals to match their knowledge needs with the existing cybersecurity proposition and to determine the right and most beneficial training for them. The results also assist the providers of cyber training and other exercises to describe the targeted development of specific cybersecurity and other knowhow in a coherent, standard-like, way.
目前全球网络安全专业人员的缺口约为200万人,而在欧洲,该行业正在寻找约35万名熟练的专业人员。对于那些希望获得全新技能或保持现有技能的现有专业人员来说,也非常需要专门的网络安全培训课程。由于缺乏新的熟练劳动力,目前的网络安全人员工作过度。为了不浪费网络安全专业人员的宝贵时间进行不必要的培训,应该做好网络演习的准备。本文基于在一个欧洲合作项目中进行的研究,更具体地说,是在2022年初组织的一次网络演习。我们研究的目的是对参与者进行初步评估,以了解他们在网络演习前的技能和期望。此评估用于微调练习。为此,我们在网络演习期间确定了参与者利益的共同趋势。初步评估是以网上调查的方式进行的。这些回答被交叉制表,以找到与参与者群体的技能和兴趣相关的有意义的指标。我们确定了行业和公共部门参与者最喜欢和最不喜欢的知识领域。我们的调查结果显示,所有受访者最感兴趣的知识领域主要是技术性的(数据安全、连接安全、系统安全),但也报告了组织安全。最不有趣的知识领域大多是非技术性的(人类安全、组织安全、社会安全),但也包括组件安全。我们还询问了首选的团队规模。大多数受访者更喜欢三到四人的团队规模。首选单次会话持续时间为46-60分钟。这些结果有助于网络安全专业人员将他们的知识需求与现有的网络安全主张相匹配,并确定对他们来说正确和最有益的培训。这些结果还有助于网络培训和其他演习的提供者以一种连贯、标准的方式描述特定网络安全和其他专业知识的目标发展。
{"title":"Participants Prefer Technical Hands-on Cyber Exercises Instead of Organisational and Societal Ones","authors":"Jani Päijänen, J. Salonen, A. Karinsalo, T. Sipola, T. Kokkonen","doi":"10.34190/eccws.22.1.1196","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1196","url":null,"abstract":"The current shortage of cybersecurity professionals is about 2 million people worldwide, and in Europe the industry is seeking for about 350 000 skilled professionals. There is also an enormous need for dedicated cybersecurity training courses for existing professionals who wish to acquire completely new skills or maintain their current ones. Due to the lack of new skilled workforce, the current cybersecurity personnel are overworked in their work. In order not to waste the valuable time of cybersecurity professionals with unnecessary training, cyber exercises should be well prepared. This article is based on research conducted in a European collaborative project and more specifically, a cyber exercise organised in early 2022. The purpose of our research was to conduct a preliminary assessment of the participants to learn about their skills and expectations before the cyber exercise. This assessment was used for fine-tuning the exercise. To achieve this, we identified common trends in the participants’ interests during the cyber exercise. The preliminary assessment was carried out as a web survey. The responses were cross tabulated to find meaningful indicators related to skills and interests of the participant group. We identified the most and least preferred knowledge areas for both the industry and public sector participants. Our findings show that the most interesting knowledge areas of all respondents were primarily technical in nature (Data Security, Connection Security, System Security), but Organisational Security was also reported.  The least interesting knowledge areas were mostly non-technical in nature (Human Security, Organisational Security, Societal Security) but also Component Security was reported. We also enquired about the preferred team size. The majority of the respondents preferred a team size of three to four persons. The preferred single session duration was 46–60 minutes. The results help cybersecurity professionals to match their knowledge needs with the existing cybersecurity proposition and to determine the right and most beneficial training for them. The results also assist the providers of cyber training and other exercises to describe the targeted development of specific cybersecurity and other knowhow in a coherent, standard-like, way.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to safely communicate with a phishing attacker by email? 如何安全地通过电子邮件与网络钓鱼攻击者通信?
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1013
Ladislav Burita, Aneta Coufalikova, Kamil Halouzka
The published study is a part of the long-term research of emails with phishing attacks against the article's author. In the previous three years, 3 experiments were carried out to analyze phishing emails. The result is their detailed classification. The subsequent experiment was focused on defense against phishing attacks using the rules of the MS Outlook email client. The last experiment, which is the article's content, is devoted to analyzing communications with phishing attackers. A fake identity was created for the experiment and security rules were set up. A total of 100 phishing emails were answered, with a preference for those whose content was not aimed at fulfilling any request; that was clarified during the communications. The conducted literature search confirmed the assumption that no one is engaged in similar research, so the results of the research may be more interesting for the cybersecurity community. The articles of the literary research are focused on the issue of social engineering from an interdisciplinary perspective. A great deal of attention has also been oriented on the influence of social networks on people information perception or on their exploitation in cyber-attacks. The result of the study is a statistical analysis of communications and a detailed analysis of its content. Out of 100 replies to the phishing email, 32 (32%) were answered by the phisher. The longest communications had 6 cycles. If the phisher insisted aggressively on personal information, the communications was terminated. From the content of the communications, the attacker's procedures and his argumentation to obtain the required information were primarily examined. A detailed analysis of the texts from the communications aimed to answer the question of whether the phisher is a robot or a person. Further considerations are being made within the team on how to continue researching phishing attacks.
发表的研究是针对文章作者的网络钓鱼攻击电子邮件的长期研究的一部分。在过去的三年里,我们进行了3次实验来分析网络钓鱼邮件。结果是它们的详细分类。随后的实验重点是使用MS Outlook电子邮件客户端的规则来防御网络钓鱼攻击。最后一个实验,也就是本文的内容,致力于分析与网络钓鱼攻击者的通信。他们为实验创建了一个假身份,并建立了安全规则。总共有100封网络钓鱼邮件得到了回复,这些邮件的内容并非旨在满足任何要求;这一点在通信中得到澄清。所进行的文献检索证实了没有人从事类似研究的假设,因此研究结果对于网络安全社区来说可能更有趣。文学研究的文章主要是从跨学科的角度来研究社会工程问题。社交网络对人们信息感知的影响以及利用社交网络进行网络攻击的问题也引起了人们的极大关注。研究的结果是对传播的统计分析和对传播内容的详细分析。在100封回复的钓鱼邮件中,有32封(32%)是由钓鱼者回复的。最长的通信周期为6个周期。如果网络钓鱼者坚持索要个人信息,通信就会终止。从通信内容来看,主要审查了攻击者获取所需信息的程序和论证。对通信文本的详细分析旨在回答钓鱼者是机器人还是人的问题。团队内部正在进一步考虑如何继续研究网络钓鱼攻击。
{"title":"How to safely communicate with a phishing attacker by email?","authors":"Ladislav Burita, Aneta Coufalikova, Kamil Halouzka","doi":"10.34190/eccws.22.1.1013","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1013","url":null,"abstract":"The published study is a part of the long-term research of emails with phishing attacks against the article's author. In the previous three years, 3 experiments were carried out to analyze phishing emails. The result is their detailed classification. The subsequent experiment was focused on defense against phishing attacks using the rules of the MS Outlook email client. The last experiment, which is the article's content, is devoted to analyzing communications with phishing attackers. A fake identity was created for the experiment and security rules were set up. A total of 100 phishing emails were answered, with a preference for those whose content was not aimed at fulfilling any request; that was clarified during the communications. The conducted literature search confirmed the assumption that no one is engaged in similar research, so the results of the research may be more interesting for the cybersecurity community. The articles of the literary research are focused on the issue of social engineering from an interdisciplinary perspective. A great deal of attention has also been oriented on the influence of social networks on people information perception or on their exploitation in cyber-attacks. The result of the study is a statistical analysis of communications and a detailed analysis of its content. Out of 100 replies to the phishing email, 32 (32%) were answered by the phisher. The longest communications had 6 cycles. If the phisher insisted aggressively on personal information, the communications was terminated. From the content of the communications, the attacker's procedures and his argumentation to obtain the required information were primarily examined. A detailed analysis of the texts from the communications aimed to answer the question of whether the phisher is a robot or a person. Further considerations are being made within the team on how to continue researching phishing attacks.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A State-of-the-art of Scientific Research on Disinformation 虚假信息的科学研究进展
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1201
Gazmend Huskaj, Stefan Axelsson
Technological advancements in information and communications technologies and related hardware and software have positively transformed the political, military, economic and social domains in all countries around the globe. These technologies are imperfect, and States and state-sponsored threat actors are exploiting flaws in hardware and software for various types of attacks. Furthermore, the same threat actors exploit software technologies to spread disinformation and disseminate false information to mislead public opinion. This research article reviews the discourse of the scientific community on disinformation. The purpose is to understand where the research focus lies and who the researchers are the co-authors, and the publication venues. This research article reviews the scientific literature using the computational literature review, a semi-automated review method and the structural topical modelling framework to understand trends in the research. Of 3 097 documents published in 1 700 publication venues between 1974 to 2022, 704 were analysed. The results reveal 46 topics on issues such as rumours and disinformation spread during the Covid-19 pandemic, Soviet and Russian Information Warfare, and Trolls and health-related themes and effects.
信息通信技术及其软硬件的技术进步,积极改变着世界各国的政治、军事、经济和社会领域。这些技术是不完善的,国家和国家支持的威胁行为者正在利用硬件和软件的缺陷进行各种类型的攻击。此外,同样的威胁行为者利用软件技术传播虚假信息和传播虚假信息来误导公众舆论。本文回顾了科学界关于虚假信息的论述。目的是了解研究重点在哪里,研究人员是谁,共同作者,以及发表地点。本研究使用计算文献综述、半自动化综述方法和结构性专题建模框架对科学文献进行综述,以了解研究趋势。在1974年至2022年期间,在1700个出版场所出版的3097份文件中,有704份被分析。结果揭示了46个主题,如在Covid-19大流行期间传播的谣言和虚假信息,苏联和俄罗斯的信息战,以及巨魔和健康相关的主题和影响。
{"title":"A State-of-the-art of Scientific Research on Disinformation","authors":"Gazmend Huskaj, Stefan Axelsson","doi":"10.34190/eccws.22.1.1201","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1201","url":null,"abstract":"Technological advancements in information and communications technologies and related hardware and software have positively transformed the political, military, economic and social domains in all countries around the globe. These technologies are imperfect, and States and state-sponsored threat actors are exploiting flaws in hardware and software for various types of attacks. Furthermore, the same threat actors exploit software technologies to spread disinformation and disseminate false information to mislead public opinion. This research article reviews the discourse of the scientific community on disinformation. The purpose is to understand where the research focus lies and who the researchers are the co-authors, and the publication venues. This research article reviews the scientific literature using the computational literature review, a semi-automated review method and the structural topical modelling framework to understand trends in the research. Of 3 097 documents published in 1 700 publication venues between 1974 to 2022, 704 were analysed. The results reveal 46 topics on issues such as rumours and disinformation spread during the Covid-19 pandemic, Soviet and Russian Information Warfare, and Trolls and health-related themes and effects.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Security: Facing Cognitive Operations in Hybrid Warfare1 认知安全:面对混合战争中的认知作战
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1442
Didier Danet
The digital space is now an active area of conflict. Attacks take many forms, to the point where concepts multiply and overlap. One concept in particular raises important questions: cognitive warfare. Cognitive warfare is an issue of concern to all countries, but there are very significant differences in approach between countries such as the United States or France and countries such as Russia, Iran or China. We try to show that these very different approaches leave Western countries unprepared for a global threat and poorly identified vulnerabilities. The concept of cognitive security therefore appears to be a promising avenue for reflection.
数字空间现在是一个活跃的冲突领域。攻击有多种形式,以至于概念成倍增加和重叠。有一个概念特别提出了重要的问题:认知战。认知战是所有国家都关心的问题,但在美国或法国等国家与俄罗斯、伊朗或中国等国家之间,在方法上存在非常显著的差异。我们试图表明,这些截然不同的方法使西方国家对全球威胁毫无准备,而且对脆弱性的认识也很差。因此,认知安全的概念似乎是一个有希望的反思途径。
{"title":"Cognitive Security: Facing Cognitive Operations in Hybrid Warfare1","authors":"Didier Danet","doi":"10.34190/eccws.22.1.1442","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1442","url":null,"abstract":"The digital space is now an active area of conflict. Attacks take many forms, to the point where concepts multiply and overlap. One concept in particular raises important questions: cognitive warfare. Cognitive warfare is an issue of concern to all countries, but there are very significant differences in approach between countries such as the United States or France and countries such as Russia, Iran or China. We try to show that these very different approaches leave Western countries unprepared for a global threat and poorly identified vulnerabilities. The concept of cognitive security therefore appears to be a promising avenue for reflection.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cyber Counterintelligence Competence Framework: Developing the Job Roles 网络反情报能力框架:发展工作角色
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1093
Thenjiwe Sithole, J. D. Toit, S. V. Solms
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute and innovative in their techniques and operations globally. These intensifying cyber risks and incidents suggest that cyber capability is inversely proportional to cyber risks, threats and attacks. Therefore, this confirms an emergent and critical need to adopt and invest in intelligence strategies, predominantly cyber counterintelligence (CCI), which is a multi-disciplinary and proactive measure to mitigate risks and counter cyber threats and cyber-attacks. Concurrent with the adoption of CCI is an appreciation that requisite job roles must be defined and developed. Notwithstanding the traction that CCI is gaining, we found no work on a clear categorisation for the CCI job roles in the academic or industry literature surveyed. Furthermore, from a cybersecurity perspective, it is unclear which job roles constitute the CCI field. This paper stems from and expands on the authors’ prior research on developing a CCI Competence Framework. The proposed CCI Competence Framework consists of four critical elements deemed essential for CCI workforce development. In order of progression, the Framework’s elements are: CCI Dimensions (passive-defensive, active-defensive, passive-offensive, active-offensive), CCI Functional Areas (detection, deterrence, deception, neutralisation), CCI Job Roles (associated with each respective Functional Area), and Tasks and Competences (allocated to each job role). Pivoting on prior research on CCI Dimensions and CCI Functional Areas, this paper advances a proposition on associated Job Roles in a manner that is both intelligible and categorised. To this end, the paper advances a five-step process that evaluates and examines Counterintelligence and Cybersecurity Job Roles and functions to derive a combination of new or existing Job Roles required for the CCI workforce/professionals. Although there are several cybersecurity frameworks for workforce development, establishing the CCI Job Roles is specifically based on the expression of the Job Roles defined in the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.
近年来,网络风险不断加剧,网络事件不断增多,网络威胁格局发生重大变化。民族国家和非国家行为体在全球范围内的技术和行动中都越来越坚定和创新。这些不断加剧的网络风险和事件表明,网络能力与网络风险、威胁和攻击成反比。因此,这证实了采用和投资情报战略的迫切需求,主要是网络反情报(CCI),这是一种多学科和主动的措施,可以减轻风险,应对网络威胁和网络攻击。在采用CCI的同时,还认识到必须定义和发展必要的工作角色。尽管CCI正在获得吸引力,但我们发现,在调查的学术或行业文献中,没有对CCI工作角色进行明确分类的工作。此外,从网络安全的角度来看,尚不清楚哪些工作角色构成了CCI领域。本文源于并扩展了作者之前关于构建CCI能力框架的研究。拟议的CCI能力框架由四个关键要素组成,这些要素被认为是CCI劳动力发展所必需的。按照进展顺序,该框架的要素是:CCI维度(被动防御、主动防御、被动进攻、主动进攻)、CCI功能区(侦查、威慑、欺骗、中和)、CCI工作角色(与每个各自的功能区相关联)以及任务和能力(分配给每个工作角色)。本文以先前对企业文化创新维度和企业文化创新功能区的研究为中心,以一种既可理解又可分类的方式提出了相关工作角色的命题。为此,本文提出了一个评估和检查反情报和网络安全工作角色和职能的五步流程,以得出CCI劳动力/专业人员所需的新工作角色或现有工作角色的组合。尽管有几种用于劳动力发展的网络安全框架,但建立CCI工作角色是专门基于国家网络安全教育倡议(NICE)网络安全劳动力框架中定义的工作角色的表达。
{"title":"A Cyber Counterintelligence Competence Framework: Developing the Job Roles","authors":"Thenjiwe Sithole, J. D. Toit, S. V. Solms","doi":"10.34190/eccws.22.1.1093","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1093","url":null,"abstract":"In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute and innovative in their techniques and operations globally. These intensifying cyber risks and incidents suggest that cyber capability is inversely proportional to cyber risks, threats and attacks. Therefore, this confirms an emergent and critical need to adopt and invest in intelligence strategies, predominantly cyber counterintelligence (CCI), which is a multi-disciplinary and proactive measure to mitigate risks and counter cyber threats and cyber-attacks. Concurrent with the adoption of CCI is an appreciation that requisite job roles must be defined and developed. Notwithstanding the traction that CCI is gaining, we found no work on a clear categorisation for the CCI job roles in the academic or industry literature surveyed. Furthermore, from a cybersecurity perspective, it is unclear which job roles constitute the CCI field. \u0000This paper stems from and expands on the authors’ prior research on developing a CCI Competence Framework. The proposed CCI Competence Framework consists of four critical elements deemed essential for CCI workforce development. In order of progression, the Framework’s elements are: CCI Dimensions (passive-defensive, active-defensive, passive-offensive, active-offensive), CCI Functional Areas (detection, deterrence, deception, neutralisation), CCI Job Roles (associated with each respective Functional Area), and Tasks and Competences (allocated to each job role). Pivoting on prior research on CCI Dimensions and CCI Functional Areas, this paper advances a proposition on associated Job Roles in a manner that is both intelligible and categorised. \u0000To this end, the paper advances a five-step process that evaluates and examines Counterintelligence and Cybersecurity Job Roles and functions to derive a combination of new or existing Job Roles required for the CCI workforce/professionals. Although there are several cybersecurity frameworks for workforce development, establishing the CCI Job Roles is specifically based on the expression of the Job Roles defined in the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities 第六代安全设计:必要性、概念与机遇
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1207
C. Lipps, Annika Tjabben, Matthias Rüb, Jan Herbst, S. P. Sanon, Rekha Reddy, Yorman Munoz, H. Schotten
Intelligent, comprehensive and, above all, secure wireless interconnection is the driving force behind technological progress. To ensure this, the development towards Sixth Generation (6G) Wireless Systems has been launched and is scheduled to be operational by 2030. This data technology of the future turns 6G into the infrastructure of a new generation of mobile, intelligent, and context-sensitive services, available everywhere and featuring high trustworthiness and performance, relying on both, network-side and off-network context sources. In addition, the networks themselves ought to become intelligent and thus more efficient and resource-saving, which requires a high degree of automated utilization of Artificial Intelligence (AI). Building upon the principles of information and communication theory for both the physical (bit)-transmission layer (PHY) and media access, new communication concepts for 6G will be developed providing the foundations for research into new single and multi-user operation, access and core networks. The flip side of this coin of opportunities: Sophisticated technology inevitably leads to additional security vulnerabilities, open access systems and Open-Radio Access Network (O-RAN) approaches imply new attack vectors. The holistic interconnection of everything renders it ever more attractive to attackers to harm systems, and create damage. Furthermore, enhanced computational power along with quantum computers make conventional systems more vulnerable than ever, and the value of the transmitted data increases tremendously: It is not only machine and sensor data, but also very personal and healthcare data transmitted with 6G. Therefore, the aim is to build a resilient and secure 6G system capable of recognizing attacks and uncertainties, flexibly absorbing them, recovering in a timely and sustainable manner, and compensating for impaired functionality through transformation. This holistic resilience-by-design approach is based, among other things, on technology such as Quantum Key Distribution (QKD) and Post Quantum-Crypto to achieve end-to-end security, Reconfigurable Intelligent Surfaces (RISs) to rely, control and manipulate the wireless transmission channel, Wireless Optical Communication (WOC), Physical Layer Security (PhySec), but also Body Area Networks (BANs), the integration of the human body relying on biometrics and the Tactile Internet (TI). These concepts will be discussed and shed light on in the scope of this work.
智能、全面、最重要的是安全的无线互联是技术进步的推动力。为了确保这一点,第六代(6G)无线系统的开发已经启动,并计划在2030年投入运营。这种未来的数据技术将6G转变为新一代移动、智能和情境敏感服务的基础设施,无处不在,具有高可信度和高性能,同时依赖于网络侧和网络外的情境源。此外,网络本身应该变得智能化,从而更加高效和节省资源,这需要高度自动化地利用人工智能(AI)。以物理(位)传输层(PHY)和媒体访问的信息和通信理论原理为基础,将开发新的6G通信概念,为研究新的单用户和多用户操作、接入和核心网提供基础。这种机遇的另一面是:复杂的技术不可避免地会导致额外的安全漏洞,开放接入系统和开放无线接入网络(O-RAN)方法意味着新的攻击媒介。万物的整体互联使得攻击者更容易破坏系统并造成破坏。此外,计算能力的增强以及量子计算机使传统系统比以往任何时候都更加脆弱,传输数据的价值也大大增加:它不仅是机器和传感器数据,而且是非常个人和医疗保健数据。因此,目标是建立一个有弹性和安全的6G系统,能够识别攻击和不确定性,灵活吸收,及时和可持续地恢复,并通过转换补偿功能受损。除其他外,这种整体的设计弹性方法基于诸如量子密钥分发(QKD)和后量子加密等技术来实现端到端安全,可重构智能表面(RISs)依赖,控制和操纵无线传输通道,无线光通信(WOC),物理层安全(PhySec),还有身体区域网络(BANs),依赖生物识别技术和触觉互联网(TI)的人体集成。这些概念将在本工作的范围内进行讨论和阐明。
{"title":"Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities","authors":"C. Lipps, Annika Tjabben, Matthias Rüb, Jan Herbst, S. P. Sanon, Rekha Reddy, Yorman Munoz, H. Schotten","doi":"10.34190/eccws.22.1.1207","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1207","url":null,"abstract":"Intelligent, comprehensive and, above all, secure wireless interconnection is the driving force behind technological progress. To ensure this, the development towards Sixth Generation (6G) Wireless Systems has been launched and is scheduled to be operational by 2030. This data technology of the future turns 6G into the infrastructure of a new generation of mobile, intelligent, and context-sensitive services, available everywhere and featuring high trustworthiness and performance, relying on both, network-side and off-network context sources. In addition, the networks themselves ought to become intelligent and thus more efficient and resource-saving, which requires a high degree of automated utilization of Artificial Intelligence (AI). Building upon the principles of information and communication theory for both the physical (bit)-transmission layer (PHY) and media access, new communication concepts for 6G will be developed providing the foundations for research into new single and multi-user operation, access and core networks. The flip side of this coin of opportunities: Sophisticated technology inevitably leads to additional security vulnerabilities, open access systems and Open-Radio Access Network (O-RAN) approaches imply new attack vectors. The holistic interconnection of everything renders it ever more attractive to attackers to harm systems, and create damage. Furthermore, enhanced computational power along with quantum computers make conventional systems more vulnerable than ever, and the value of the transmitted data increases tremendously: It is not only machine and sensor data, but also very personal and healthcare data transmitted with 6G. Therefore, the aim is to build a resilient and secure 6G system capable of recognizing attacks and uncertainties, flexibly absorbing them, recovering in a timely and sustainable manner, and compensating for impaired functionality through transformation. This holistic resilience-by-design approach is based, among other things, on technology such as Quantum Key Distribution (QKD) and Post Quantum-Crypto to achieve end-to-end security, Reconfigurable Intelligent Surfaces (RISs) to rely, control and manipulate the wireless transmission channel, Wireless Optical Communication (WOC), Physical Layer Security (PhySec), but also Body Area Networks (BANs), the integration of the human body relying on biometrics and the Tactile Internet (TI). These concepts will be discussed and shed light on in the scope of this work.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128814002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1