首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
Legal and ethical issues of pre-incident forensic analysis. 事故前法医分析的法律和道德问题。
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.358
I. Sutherland, Matthew Bovee, K. Xynos, H. Read
Investigators searching for digital evidence may encounter a variety of different IoT (Internet of Things) devices. Data in such devices and their environments can be both valuable, but also highly volatile. To meet best practices and to process these devices in an expeditious and forensically-sound manner, an investigator should have a predefined plan. Developing such plans requires prior knowledge developed through the exploration and experimentation of the “target” devices. The expanding variety, number, and pervasiveness of IoT devices means there is an increasing need for pre-incident analysis to ensure forensic tools and techniques acquire, preserve and document evidence appropriately. Many of these IoT devices have proprietary file- and operating-systems and may employ mechanisms to protect intellectual property by limiting or preventing access by researchers. Disassembly of the device and circumventing these mechanisms may be restricted by contract, end-user licence agreement (EULA) or legislation regarding intellectual-property rights. Legislative exclusions exist for security research, in some jurisdictions, permitting legitimate analyses. The pre-incident analyses of hardware to establish a forensic process bear some similarity to vulnerability and security research, however there are distinct differences in their end goals. This paper discusses the legal and ethical issues that may be encountered when conducting pre-incident forensics analyses focussing on IoT hardware. It highlights areas of particular concern, identifies best practice and subjects requiring future work as presented in the literature before providing a series of recommendations for forensics investigators processing these types of devices.
搜索数字证据的调查人员可能会遇到各种不同的物联网设备。这些设备及其环境中的数据可能很有价值,但也非常不稳定。为了符合最佳做法,并以快速和法医合理的方式处理这些设备,调查人员应该有一个预先确定的计划。制定这样的计划需要通过对“目标”设备的探索和实验来开发先验知识。物联网设备的种类、数量和普及程度不断扩大,这意味着对事件前分析的需求越来越大,以确保取证工具和技术能够适当地获取、保存和记录证据。这些物联网设备中的许多都具有专有的文件和操作系统,并可能采用限制或阻止研究人员访问的机制来保护知识产权。设备的拆卸和规避这些机制可能受到合同、最终用户许可协议(EULA)或有关知识产权的立法的限制。在某些司法管辖区,安全研究存在立法排除,允许合法分析。对硬件进行事件前分析以建立取证过程与漏洞和安全研究有一些相似之处,但两者的最终目标存在明显差异。本文讨论了针对物联网硬件进行事件前取证分析时可能遇到的法律和道德问题。它强调了特别关注的领域,确定了文献中提出的最佳实践和需要未来工作的主题,然后为法医调查员处理这些类型的设备提供了一系列建议。
{"title":"Legal and ethical issues of pre-incident forensic analysis.","authors":"I. Sutherland, Matthew Bovee, K. Xynos, H. Read","doi":"10.34190/eccws.22.1.358","DOIUrl":"https://doi.org/10.34190/eccws.22.1.358","url":null,"abstract":"Investigators searching for digital evidence may encounter a variety of different IoT (Internet of Things) devices. Data in such devices and their environments can be both valuable, but also highly volatile. To meet best practices and to process these devices in an expeditious and forensically-sound manner, an investigator should have a predefined plan. Developing such plans requires prior knowledge developed through the exploration and experimentation of the “target” devices. The expanding variety, number, and pervasiveness of IoT devices means there is an increasing need for pre-incident analysis to ensure forensic tools and techniques acquire, preserve and document evidence appropriately. Many of these IoT devices have proprietary file- and operating-systems and may employ mechanisms to protect intellectual property by limiting or preventing access by researchers. Disassembly of the device and circumventing these mechanisms may be restricted by contract, end-user licence agreement (EULA) or legislation regarding intellectual-property rights. Legislative exclusions exist for security research, in some jurisdictions, permitting legitimate analyses. The pre-incident analyses of hardware to establish a forensic process bear some similarity to vulnerability and security research, however there are distinct differences in their end goals. This paper discusses the legal and ethical issues that may be encountered when conducting pre-incident forensics analyses focussing on IoT hardware. It highlights areas of particular concern, identifies best practice and subjects requiring future work as presented in the literature before providing a series of recommendations for forensics investigators processing these types of devices.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semiotics of Strategic Narratives of "Antichrist" in Russia’s War in Ukraine 俄罗斯乌克兰战争中“敌基督”战略叙事的符号学研究
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1102
M. Hotchkiss
The Russian war in Ukraine which began on February 24, 2022 coincides with the ongoing schism of the Moscow Patriarchate of the Russian Orthodox Church from the Ecumenical Patriarchate of Constantinople, to which the Orthodox Church of Ukraine affiliates. In this setting, spiritual and secular leaders in Russia and Ukraine have mutually utilised narratives of the Antichrist and Satan to explain Russian attacks on Ukraine, imbuing a “spiritual” dimension to the strategic communications in the conflict. This paper applies a semiotic approach to analysing the antichrist and satanic myths at play in the context of ideological “strategic narratives”, and the conflict of meanings which emerges from these competing narratives. In Russia, these ideomyths have long been utilised as ideological tools which place the nation metaphysically in perennial militant opposition to the West. However, Ukraine which is striving to leave the Russian orbit and join the West has reciprocally framed Russia and its leader in similar concepts. In conclusion, this paper argues that there is opportunity for the creation of political messaging which can frame the conflict in spiritual and moral terms that can resonate with both Western and Russian thinkers.
俄罗斯在乌克兰的战争始于2022年2月24日,与此同时,俄罗斯东正教莫斯科宗主教区与乌克兰东正教附属的君士坦丁堡普世宗主教区正在分裂。在这种背景下,俄罗斯和乌克兰的精神和世俗领袖相互利用反基督者和撒旦的叙述来解释俄罗斯对乌克兰的袭击,为冲突中的战略沟通注入了“精神”层面。本文运用符号学方法分析了意识形态“战略叙事”背景下的反基督和撒旦神话,以及这些相互竞争的叙事所产生的意义冲突。在俄罗斯,这些意识形态神话长期以来一直被用作意识形态工具,将这个国家形而上地置于与西方长期斗争的对立面。然而,正在努力脱离俄罗斯轨道并加入西方的乌克兰也以类似的概念相互陷害俄罗斯及其领导人。总之,本文认为,有机会创造政治信息,可以在精神和道德方面构建冲突,这可以引起西方和俄罗斯思想家的共鸣。
{"title":"Semiotics of Strategic Narratives of \"Antichrist\" in Russia’s War in Ukraine","authors":"M. Hotchkiss","doi":"10.34190/eccws.22.1.1102","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1102","url":null,"abstract":"The Russian war in Ukraine which began on February 24, 2022 coincides with the ongoing schism of the Moscow Patriarchate of the Russian Orthodox Church from the Ecumenical Patriarchate of Constantinople, to which the Orthodox Church of Ukraine affiliates. In this setting, spiritual and secular leaders in Russia and Ukraine have mutually utilised narratives of the Antichrist and Satan to explain Russian attacks on Ukraine, imbuing a “spiritual” dimension to the strategic communications in the conflict. This paper applies a semiotic approach to analysing the antichrist and satanic myths at play in the context of ideological “strategic narratives”, and the conflict of meanings which emerges from these competing narratives. In Russia, these ideomyths have long been utilised as ideological tools which place the nation metaphysically in perennial militant opposition to the West. However, Ukraine which is striving to leave the Russian orbit and join the West has reciprocally framed Russia and its leader in similar concepts. In conclusion, this paper argues that there is opportunity for the creation of political messaging which can frame the conflict in spiritual and moral terms that can resonate with both Western and Russian thinkers.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Whole-of-Society Approach to Organise for Offensive Cyberspace Operations: The Case of the Smart State Sweden 组织进攻性网络空间行动的全社会方法:智能国家瑞典的案例
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1188
Gazmend Huskaj, Stefan Axelsson
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destroy information assets, and cybercrime. These operations are possible thanks to the innovation and development of information and communications technologies (ICT). Interconnected information systems have transformed societies positively. However, specific states exploit these systems' vulnerabilities to advance their strategic national interests. Therefore, it is important to know how a state can organise itself to defend against threat actors. The purpose of this research is to present how the smart state Sweden can through a whole-of-society approach organise for Offensive Cyberspace Operations. The intent is to conduct an active and independent foreign-, security- and defence policy, but also as a base for deterrence and defence. This article is based on a mixed methods approach. It uses the case study research strategy to discover new information. Fourteen men and women participated in individual semi-structured interviews. The respondents ranged in age from 40 to 65 with more than 20 years of experience in cyberspace operations, intelligence operations, military operations, special forces operations, and knowledge and understanding about information warfare and information operations. The analytic strategies include thematic analysis and quantitative methods to interpret the data. The results show many themes, but the article is especially focused on the themes of Operations, Capability, Policy & Governance, and Legal Frameworks. Finally, a conceptual map of a whole-of-society approach to organise for offensive cyberspace operations is presented inferred from the themes, codes, and content, and mapped to each responsible agency based on the interviews and codes. The answer to the research question is that Sweden should have a whole-of-society approach to organise for Offensive Cyberspace Operations to project power in and through cyberspace with the intent to conduct an active and independent foreign, security and defence policy and for deterrence, as described in Figure 2.
威胁行为者出于多种目的进行攻击性网络空间行动,如间谍活动、破坏信息资产和网络犯罪。由于信息和通信技术(ICT)的创新和发展,这些行动成为可能。互联的信息系统积极地改变了社会。然而,某些国家利用这些系统的脆弱性来推进其战略国家利益。因此,了解一个国家如何组织起来抵御威胁行为者是很重要的。本研究的目的是展示智能国家瑞典如何通过全社会方法组织进攻性网络空间行动。其目的是实施积极和独立的外交、安全和国防政策,但也作为威慑和防御的基础。本文基于混合方法方法。它使用案例研究策略来发现新的信息。14名男性和女性参加了单独的半结构化访谈。受访者的年龄从40岁到65岁不等,在网络空间作战、情报作战、军事作战、特种部队作战方面有20年以上的经验,对信息战和信息作战有一定的认识和理解。分析策略包括专题分析和定量分析。结果显示了许多主题,但本文特别关注于操作、能力、政策和治理以及法律框架的主题。最后,从主题、代码和内容中推断出组织进攻性网络空间行动的全社会方法的概念图,并根据访谈和代码映射到每个责任机构。研究问题的答案是,瑞典应该有一个全社会的方法来组织进攻性网络空间行动,在网络空间中并通过网络空间投射力量,意图实施积极和独立的外交、安全和国防政策,并进行威慑,如图2所示。
{"title":"A Whole-of-Society Approach to Organise for Offensive Cyberspace Operations: The Case of the Smart State Sweden","authors":"Gazmend Huskaj, Stefan Axelsson","doi":"10.34190/eccws.22.1.1188","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1188","url":null,"abstract":"Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destroy information assets, and cybercrime. These operations are possible thanks to the innovation and development of information and communications technologies (ICT). Interconnected information systems have transformed societies positively. However, specific states exploit these systems' vulnerabilities to advance their strategic national interests. Therefore, it is important to know how a state can organise itself to defend against threat actors. The purpose of this research is to present how the smart state Sweden can through a whole-of-society approach organise for Offensive Cyberspace Operations. The intent is to conduct an active and independent foreign-, security- and defence policy, but also as a base for deterrence and defence. This article is based on a mixed methods approach. It uses the case study research strategy to discover new information. Fourteen men and women participated in individual semi-structured interviews. The respondents ranged in age from 40 to 65 with more than 20 years of experience in cyberspace operations, intelligence operations, military operations, special forces operations, and knowledge and understanding about information warfare and information operations. The analytic strategies include thematic analysis and quantitative methods to interpret the data. The results show many themes, but the article is especially focused on the themes of Operations, Capability, Policy & Governance, and Legal Frameworks. Finally, a conceptual map of a whole-of-society approach to organise for offensive cyberspace operations is presented inferred from the themes, codes, and content, and mapped to each responsible agency based on the interviews and codes. The answer to the research question is that Sweden should have a whole-of-society approach to organise for Offensive Cyberspace Operations to project power in and through cyberspace with the intent to conduct an active and independent foreign, security and defence policy and for deterrence, as described in Figure 2.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing an Email Attack by Analysing the Victim’s Profile. An Alternative Anti-Phishing Training Method 通过分析受害者的个人资料设计电子邮件攻击。另一种反网络钓鱼培训方法
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1178
D. Lappas, P. Karampelas
According to Thomson-Reuters the top cyber threat today is phishing in which people are tricked either to click a malicious link or give out personal information. It’s a fact that 96% of these phishing attacks comes from emails, which amount to more than 3.4 billion daily, as reported by Cisco. Austrian aerospace company FACC, Belgian bank Crelan, Acorn financial services and many other companies were recently fell victims of phishing emails losing millions of dollars. Even if experts provide lists of signs that users should seek in an email in order to understand if it is legitimate or scam, the attackers have elevated the quality of the email messages making them believable and very hard to discern them. In order to respond to this elevated threat, unconventional user training is required, focusing on recognizing a phishing email. Knowing how an attacker thinks and prepares the attack vector against a target, we claim that it will make users more suspicious when they receive one. In this regard, an innovative education intervention (consisted of two phases) was designed and developed. In the first phase, 98 participants were asked to visit an artificial social media profile and prepare a phishing email in order to persuade the victim to click a link. Then, the participants were presented with an innovative guided workflow to prepare a spear phishing email which was based on social media intelligence. In the second phase, they were asked to prepare one more email for the same person applying this time the guided workflow. Comparing the two different emails created, we found that the guided workflow led to the creation of more authentic emails which could potentially trick the victim easier. Based on the theory of active learning, we believe that by teaching users how attackers exploit their personal information in order to develop their attack vectors, it will increase their awareness not only for the typical phishing emails but also for more sophisticated spear phishing attacks.
据汤森路透报道,当今最大的网络威胁是网络钓鱼,人们被诱骗点击恶意链接或提供个人信息。事实上,根据思科的报告,96%的网络钓鱼攻击来自电子邮件,每天的电子邮件数量超过34亿封。奥地利航空航天公司FACC、比利时克兰银行、Acorn金融服务公司和许多其他公司最近都成为了网络钓鱼邮件的受害者,损失了数百万美元。即使专家提供了用户应该在电子邮件中寻找的迹象列表,以便了解它是合法的还是骗局,攻击者也提高了电子邮件信息的质量,使它们变得可信,并且很难辨别。为了应对这种升级的威胁,需要非常规的用户培训,重点是识别网络钓鱼电子邮件。了解攻击者如何思考和准备针对目标的攻击向量,我们声称当用户收到攻击向量时,这会使他们更加怀疑。在这方面,设计和开发了一种创新的教育干预(包括两个阶段)。在第一阶段,98名参与者被要求访问一个虚假的社交媒体个人资料,并准备一封网络钓鱼邮件,以说服受害者点击链接。然后,向参与者展示了一个创新的指导工作流程,以准备基于社交媒体情报的鱼叉式网络钓鱼电子邮件。在第二阶段,他们被要求为同一个人准备另一封电子邮件,这一次他们应用了指导的工作流程。比较两种不同的电子邮件,我们发现引导的工作流程导致创建更真实的电子邮件,这可能更容易欺骗受害者。基于主动学习理论,我们认为,通过教导用户攻击者如何利用他们的个人信息来开发攻击向量,不仅可以提高他们对典型的网络钓鱼邮件的认识,还可以提高他们对更复杂的鱼叉式网络钓鱼攻击的认识。
{"title":"Designing an Email Attack by Analysing the Victim’s Profile. An Alternative Anti-Phishing Training Method","authors":"D. Lappas, P. Karampelas","doi":"10.34190/eccws.22.1.1178","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1178","url":null,"abstract":"According to Thomson-Reuters the top cyber threat today is phishing in which people are tricked either to click a malicious link or give out personal information. It’s a fact that 96% of these phishing attacks comes from emails, which amount to more than 3.4 billion daily, as reported by Cisco. Austrian aerospace company FACC, Belgian bank Crelan, Acorn financial services and many other companies were recently fell victims of phishing emails losing millions of dollars. Even if experts provide lists of signs that users should seek in an email in order to understand if it is legitimate or scam, the attackers have elevated the quality of the email messages making them believable and very hard to discern them. In order to respond to this elevated threat, unconventional user training is required, focusing on recognizing a phishing email. Knowing how an attacker thinks and prepares the attack vector against a target, we claim that it will make users more suspicious when they receive one. In this regard, an innovative education intervention (consisted of two phases) was designed and developed. In the first phase, 98 participants were asked to visit an artificial social media profile and prepare a phishing email in order to persuade the victim to click a link. Then, the participants were presented with an innovative guided workflow to prepare a spear phishing email which was based on social media intelligence. In the second phase, they were asked to prepare one more email for the same person applying this time the guided workflow. Comparing the two different emails created, we found that the guided workflow led to the creation of more authentic emails which could potentially trick the victim easier. Based on the theory of active learning, we believe that by teaching users how attackers exploit their personal information in order to develop their attack vectors, it will increase their awareness not only for the typical phishing emails but also for more sophisticated spear phishing attacks.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127198512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Interpretation of Integrated Deterrence: Physical and Virtual Strategies 综合威慑的新诠释:物理与虚拟战略
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1314
Jim Chen
The integrated deterrence strategy, backstopped by nuclear deterrent, calls for seamless collaboration in deterrence across warfighting domains, using all instruments of national power, and with allies and partners. Being a warfighting domain and being closely related to the information instrument of national power, the cyber domain should certainly be included, and cyber deterrence should play a significant role in the integrated deterrence strategy. Nevertheless, as cyber deterrence seems not to be as effective as it is expected at least currently, some scholars and practitioners doubt its mere existence, not mentioning the role that it can play in the integrated deterrence strategy. This paper argues that not having deterrence in cyberspace leaves a blank spot in the strategy since some critical functionality of deterrence in cyberspace cannot easily be replaced. By recognizing the unique strategic context of cyberspace, the paper maintains that deterrent effect can actually be achieved in unique ways in this space. To further explore the unique role that deterrence in cyberspace plays within the integrated deterrence strategy, this paper proposes a multi-level and multi-aspect architecture for integrated deterrence strategy. This novel architecture is able to cover varied levels of strategic environments both below and above the threshold of armed conflict. It is also able to correlate varied deterrent measures with varied strategic environments categorized via various aspects, such as diplomacy, information, military, economy, etc. This paper shows that the inclusion of deterrence in cyberspace can empower the strategy by making the strategy flexible enough in tackling various challenges. Eventually, the strategy can make its contribution in preventing war and maintaining peace.
以核威慑为后盾的综合威慑战略要求在各个作战领域进行无缝协作,使用国家力量的所有工具,并与盟国和伙伴进行威慑。网络领域作为作战领域,与国家权力的信息工具密切相关,当然应该纳入其中,网络威慑应该在综合威慑战略中发挥重要作用。然而,至少从目前来看,网络威慑似乎并不像预期的那样有效,一些学者和实践者怀疑它的存在,更不用说它在综合威慑战略中可以发挥的作用。本文认为,由于网络空间威慑的一些关键功能无法轻易取代,因此不具备网络空间威慑在战略上留下了空白。通过认识到网络空间独特的战略背景,本文认为,在这一空间中,威慑效果实际上可以通过独特的方式实现。为进一步探索网络空间威慑在综合威慑战略中发挥的独特作用,本文提出了一个多层次、多面向的综合威慑战略架构。这种新颖的架构能够涵盖武装冲突阈值以下和以上的各种战略环境。它还能够将各种威慑措施与通过外交、信息、军事、经济等各个方面分类的各种战略环境相关联。本文表明,将威慑纳入网络空间可以使战略在应对各种挑战时具有足够的灵活性,从而赋予战略权力。最终,该战略可以在防止战争和维护和平方面做出贡献。
{"title":"A New Interpretation of Integrated Deterrence: Physical and Virtual Strategies","authors":"Jim Chen","doi":"10.34190/eccws.22.1.1314","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1314","url":null,"abstract":"The integrated deterrence strategy, backstopped by nuclear deterrent, calls for seamless collaboration in deterrence across warfighting domains, using all instruments of national power, and with allies and partners. Being a warfighting domain and being closely related to the information instrument of national power, the cyber domain should certainly be included, and cyber deterrence should play a significant role in the integrated deterrence strategy. Nevertheless, as cyber deterrence seems not to be as effective as it is expected at least currently, some scholars and practitioners doubt its mere existence, not mentioning the role that it can play in the integrated deterrence strategy. This paper argues that not having deterrence in cyberspace leaves a blank spot in the strategy since some critical functionality of deterrence in cyberspace cannot easily be replaced. By recognizing the unique strategic context of cyberspace, the paper maintains that deterrent effect can actually be achieved in unique ways in this space. To further explore the unique role that deterrence in cyberspace plays within the integrated deterrence strategy, this paper proposes a multi-level and multi-aspect architecture for integrated deterrence strategy. This novel architecture is able to cover varied levels of strategic environments both below and above the threshold of armed conflict. It is also able to correlate varied deterrent measures with varied strategic environments categorized via various aspects, such as diplomacy, information, military, economy, etc. This paper shows that the inclusion of deterrence in cyberspace can empower the strategy by making the strategy flexible enough in tackling various challenges. Eventually, the strategy can make its contribution in preventing war and maintaining peace.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO? 探测、否认、降级、干扰、破坏、欺骗:OCO中哪个是最大的?
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1089
Tim D. Grant
In the cyber kill chain literature, possible courses of action are listed as detect, deny, degrade, disrupt, destroy, and deceive (a.k.a. “the 6Ds”). These verbs denote defensive action to be taken against an intruder. By comparison, military doctrine for cyberspace operations encompasses cyberspace exploitation and attack, as well as defence. The question arises whether the 6Ds are also applicable to offensive action, i.e. exploitation and attack, or whether additional action verbs are needed. Military doctrine is evolving towards all-domain operations, in which action in cyberspace is integrated with action in the physical domains of land, sea, air, and space. This prompts the question as to whether the 6Ds are also suited to action in a physical domain. A pilot study of actual military operations that integrated cyber and physical action suggests that deception, delay, and denial of organisational and cyber entities is suited to cyber action, while seizure, capture, and destruction of physical entities is suited to physical action. Preference among action verbs may indicate when it is best to engage targets using cyber or physical resources and which action is preferred. This paper identifies which action verbs are best suited to offensive cyber operations in the context of all-domain operations. The paper reviews related theory on cyberspace and the cyber kill chain. It identifies action verbs in US Department of Defense (DoD) doctrine on information and cyberspace operations, comparing them to those in the US DoD Dictionary of Military and Associated Terms. After discussing the findings, the paper draws conclusions and recommends further work.
在网络杀伤链的文献中,可能的行动方案被列出为探测、拒绝、降级、破坏、摧毁和欺骗(又名“6d”)。这些动词都表示对入侵者采取的防御行动。相比之下,网络空间作战的军事理论包括网络空间的利用和攻击,以及防御。问题是6d是否也适用于进攻性行为,即利用和攻击,或者是否需要额外的动作动词。军事理论正朝着全域作战的方向发展,即网络空间的行动与陆地、海洋、空中和太空等物理领域的行动相结合。这就提出了一个问题,即6d是否也适合在物理领域采取行动。一项综合网络和实体行动的实际军事行动的试点研究表明,对组织和网络实体的欺骗、延迟和拒绝适用于网络行动,而对实体实体的扣押、捕获和破坏适用于实体行动。动作动词之间的偏好可能表明何时使用网络或物理资源与目标交战是最好的,以及哪种动作是首选的。本文确定了在全域作战背景下,哪些动作动词最适合进攻性网络作战。本文综述了网络空间和网络杀伤链的相关理论。它识别了美国国防部(DoD)关于信息和网络空间作战的学说中的行为动词,并将其与美国国防部军事及相关术语词典中的行为动词进行了比较。在讨论了这些发现之后,论文得出结论并建议进一步的工作。
{"title":"Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?","authors":"Tim D. Grant","doi":"10.34190/eccws.22.1.1089","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1089","url":null,"abstract":"In the cyber kill chain literature, possible courses of action are listed as detect, deny, degrade, disrupt, destroy, and deceive (a.k.a. “the 6Ds”). These verbs denote defensive action to be taken against an intruder. By comparison, military doctrine for cyberspace operations encompasses cyberspace exploitation and attack, as well as defence. The question arises whether the 6Ds are also applicable to offensive action, i.e. exploitation and attack, or whether additional action verbs are needed. Military doctrine is evolving towards all-domain operations, in which action in cyberspace is integrated with action in the physical domains of land, sea, air, and space. This prompts the question as to whether the 6Ds are also suited to action in a physical domain. A pilot study of actual military operations that integrated cyber and physical action suggests that deception, delay, and denial of organisational and cyber entities is suited to cyber action, while seizure, capture, and destruction of physical entities is suited to physical action. Preference among action verbs may indicate when it is best to engage targets using cyber or physical resources and which action is preferred. This paper identifies which action verbs are best suited to offensive cyber operations in the context of all-domain operations. The paper reviews related theory on cyberspace and the cyber kill chain. It identifies action verbs in US Department of Defense (DoD) doctrine on information and cyberspace operations, comparing them to those in the US DoD Dictionary of Military and Associated Terms. After discussing the findings, the paper draws conclusions and recommends further work.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129732116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demand Analysis of the Cybersecurity Knowledge Areas and Skills for the Nurses: Preliminary Findings 护士网络安全知识领域和技能需求分析:初步调查结果
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1181
J. Rajamäki, Paresh Rathod, K. Kioskli
The purpose of this paper is to present a preliminary analysis of the cybersecurity market demand in the nursing and health sector. Currently, the market demand study is ongoing under the Digital Europe Programme CyberSecPro project, which strengthens the role of higher education institutions as a provider of practical and working life skills. The project promotes reliable digital transformation in critical sectors, such as healthcare. The rapid development of e-health emphasizes the central position of cybersecurity in healthcare organizations that are increasingly the targets of cyber-attacks. This descriptive literature review explores what a nurse needs to know about cybersecurity. Our results show that awareness of cyber risks is weak in the healthcare sector. Understanding cyber risks and recognizing the effects of one's own activities increases the cybersecurity of the entire organization, therefore cybersecurity training for nurses should be increased. Our study suggested that nurses’ most important cyber skills are their own cyber-safe way of operations, identifying cyber threats related to equipment, identifying the effects of cyber disruptions, and acting in a cyber disruption situation. Future nurse training programs should be updated to include these skills. Additionally, the teaching of nurses must be developed so that it meets these competence needs.
本文的目的是对护理和卫生部门的网络安全市场需求进行初步分析。目前,数字欧洲计划CyberSecPro项目正在进行市场需求研究,以加强高等教育机构作为实用和工作生活技能提供者的作用。该项目促进医疗保健等关键部门的可靠数字化转型。电子医疗的快速发展强调了网络安全在日益成为网络攻击目标的医疗机构中的核心地位。这篇描述性文献综述探讨了护士需要了解的网络安全知识。我们的研究结果表明,医疗保健行业对网络风险的认识较弱。了解网络风险并认识到自己活动的影响可以提高整个组织的网络安全,因此应该增加对护士的网络安全培训。我们的研究表明,护士最重要的网络技能是他们自己的网络安全操作方式,识别与设备相关的网络威胁,识别网络中断的影响,并在网络中断的情况下采取行动。未来的护士培训计划应该更新以包括这些技能。此外,必须发展护士的教学,使其满足这些能力需求。
{"title":"Demand Analysis of the Cybersecurity Knowledge Areas and Skills for the Nurses: Preliminary Findings","authors":"J. Rajamäki, Paresh Rathod, K. Kioskli","doi":"10.34190/eccws.22.1.1181","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1181","url":null,"abstract":"The purpose of this paper is to present a preliminary analysis of the cybersecurity market demand in the nursing and health sector. Currently, the market demand study is ongoing under the Digital Europe Programme CyberSecPro project, which strengthens the role of higher education institutions as a provider of practical and working life skills. The project promotes reliable digital transformation in critical sectors, such as healthcare. The rapid development of e-health emphasizes the central position of cybersecurity in healthcare organizations that are increasingly the targets of cyber-attacks. This descriptive literature review explores what a nurse needs to know about cybersecurity. Our results show that awareness of cyber risks is weak in the healthcare sector. Understanding cyber risks and recognizing the effects of one's own activities increases the cybersecurity of the entire organization, therefore cybersecurity training for nurses should be increased. Our study suggested that nurses’ most important cyber skills are their own cyber-safe way of operations, identifying cyber threats related to equipment, identifying the effects of cyber disruptions, and acting in a cyber disruption situation. Future nurse training programs should be updated to include these skills. Additionally, the teaching of nurses must be developed so that it meets these competence needs.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid threats-possible consequences in societal contexts 混合威胁——在社会环境中可能产生的后果
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1119
Georgiana-Daniela Lupulescu
Hybrid threats have become a persistent term in the 21st century geopolitical architecture, acquiring new values ​​as innovative unconventional means come to be used by both state and non-state actors in contemporary conflicts, with a view to obtaining strategic advantages, yet with devastating consequences at individual level. While the armed conflict effects have long been studied, the war metamorphosis with hybrid threats innuendos bring new challenges in assessing societal consequences, even more so, as they are increasingly identified in apparently peaceful times. A multifaced perspective on the threat outcome reveals multiple latent consequences, such as physical, material, psychological and emotional ones. Fear, one of the dominant human emotions, is the first to be triggered when any threat is present, regardless of its occurrence probability or possible effects. Fear becomes a strong drive for individuals’ future actions, sometimes prompting an offensive or defensive reaction previously embedded in the main actor’s behavior. In this context, the present paper aims to identify, analyze and understand the Russian-Ukrainian conflict consequences on the European states’ neighboring population, looking at the reactions and decisions triggered by fear. Using observation as a research method but also the case study method, we identified a series of similarities and differences in these countries’ reaction to solving situations, migration- generated crises, Russian disinformation and propaganda and Ukraine or other European state oriented cyber-attack. The main goal for this approach is to highlight the hybrid threats emotional consequences in conflicts that are more than psychological. Moreover, this is a preliminary step in a PhD research thesis with a view to provide states with solutions for resilience policies, to ensure their citizens’ survival and well-being.
混合威胁已成为21世纪地缘政治架构中的一个持久术语,随着国家和非国家行为体在当代冲突中使用创新的非常规手段,获得新的价值,以期获得战略优势,但在个人层面上造成毁灭性后果。尽管人们对武装冲突的影响进行了长期的研究,但带有混合威胁暗示的战争蜕变为评估社会后果带来了新的挑战,尤其是在明显的和平时期,人们越来越多地认识到这一点。对威胁结果的多面视角揭示了多重潜在后果,如身体、物质、心理和情感方面的后果。恐惧是人类的主要情绪之一,当任何威胁出现时,无论其发生的概率或可能的影响如何,它都是首先被触发的。恐惧成为个人未来行为的强大驱动力,有时会引发先前嵌入主要行为者行为中的攻击或防御反应。在此背景下,本文旨在识别、分析和理解俄罗斯-乌克兰冲突对欧洲国家邻国人口的影响,研究恐惧引发的反应和决定。我们将观察作为一种研究方法,同时也采用案例研究方法,确定了这些国家在解决局势、移民引发的危机、俄罗斯的虚假信息和宣传以及乌克兰或其他欧洲国家导向的网络攻击方面的一系列反应的异同。这种方法的主要目标是强调冲突中的混合威胁和情绪后果,而不仅仅是心理上的。此外,这是博士研究论文的初步步骤,旨在为各国提供弹性政策的解决方案,以确保其公民的生存和福祉。
{"title":"Hybrid threats-possible consequences in societal contexts","authors":"Georgiana-Daniela Lupulescu","doi":"10.34190/eccws.22.1.1119","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1119","url":null,"abstract":"Hybrid threats have become a persistent term in the 21st century geopolitical architecture, acquiring new values ​​as innovative unconventional means come to be used by both state and non-state actors in contemporary conflicts, with a view to obtaining strategic advantages, yet with devastating consequences at individual level. While the armed conflict effects have long been studied, the war metamorphosis with hybrid threats innuendos bring new challenges in assessing societal consequences, even more so, as they are increasingly identified in apparently peaceful times. A multifaced perspective on the threat outcome reveals multiple latent consequences, such as physical, material, psychological and emotional ones. Fear, one of the dominant human emotions, is the first to be triggered when any threat is present, regardless of its occurrence probability or possible effects. Fear becomes a strong drive for individuals’ future actions, sometimes prompting an offensive or defensive reaction previously embedded in the main actor’s behavior. In this context, the present paper aims to identify, analyze and understand the Russian-Ukrainian conflict consequences on the European states’ neighboring population, looking at the reactions and decisions triggered by fear. Using observation as a research method but also the case study method, we identified a series of similarities and differences in these countries’ reaction to solving situations, migration- generated crises, Russian disinformation and propaganda and Ukraine or other European state oriented cyber-attack. The main goal for this approach is to highlight the hybrid threats emotional consequences in conflicts that are more than psychological. Moreover, this is a preliminary step in a PhD research thesis with a view to provide states with solutions for resilience policies, to ensure their citizens’ survival and well-being.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Concept of Comprehensive Security as a Tool for Cyber Deterrence 作为网络威慑工具的综合安全观
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1254
Maria Keinonen
Cyber deterrence is often studied from the point of view of deterrence by punishment or offensive cyber strategies. A vast amount of studies claim that deterrence in cyberspace can never be successful with cyber means alone due to technical challenges and the problem of attribution. Some scholars argue that cyber resilience is an essential part of cyber deterrence, since not every cyberattack can be countered. These reviews are usually technical and concentrate on investigating the balance of offensive and defensive cyber strategies. The technical view leaves gaps in the physical and cyber-persona layers of cyberspace. This paper examines resilience from a societal perspective and reflects on the findings of cyber deterrence theories. The Concept of Comprehensive Security (CCS) is a Finnish model for building and sustaining resilience in society. Preparation for disruptive situations is carried out with the operating principle of overall safety, where society´s vital functions are protected in collaboration between the authorities, the business world, organisations, and citizens. The growing importance of cyber security has led to emphasising the importance of cyber resilience in the Concept of Comprehensive Security. This study investigates the possibilities to utilize the CCS as a tool for cyber deterrence and aims to create a new perspective on the international academic discussion of cyber deterrence. The research method is content analysis. The investigated material consists of Finnish CCS documents, as well as academic cyber deterrence and cyber resilience literature. The characteristics of the CCS are compared to the factors found in the cyber deterrence material to answer the research question. The key observation presented in this study is that a comprehensive approach to building resilience in the society is essential for the credibility of cyber deterrence. Resilience in cyberspace should be viewed from the perspective of every layer, including logical, physical and cyber-persona layers.
网络威慑通常是从惩罚威慑或进攻性网络战略的角度来研究的。大量研究声称,由于技术挑战和归因问题,仅靠网络手段无法成功实现网络空间威慑。一些学者认为,网络弹性是网络威慑的重要组成部分,因为并非所有网络攻击都可以被反击。这些审查通常是技术性的,集中于调查进攻性和防御性网络战略的平衡。技术观点在网络空间的物理和网络人物层面留下了空白。本文从社会角度考察了弹性,并反思了网络威慑理论的研究结果。综合安全概念(CCS)是芬兰建立和维持社会复原力的模式。在全面安全的运作原则下,为破坏性情况做好准备,在当局、商业世界、组织和公民之间的合作下,保护社会的重要功能。随着网络安全日益重要,综合安全观强调了网络弹性的重要性。本研究探讨了利用CCS作为网络威慑工具的可能性,旨在为网络威慑的国际学术讨论创造一个新的视角。研究方法为内容分析法。调查材料包括芬兰CCS文件,以及学术网络威慑和网络弹性文献。将CCS的特点与网络威慑材料中发现的因素进行比较,以回答研究问题。本研究提出的关键观察是,在社会中建立弹性的综合方法对于网络威慑的可信度至关重要。网络空间的弹性应该从各个层面来看待,包括逻辑、物理和网络人物层面。
{"title":"The Concept of Comprehensive Security as a Tool for Cyber Deterrence","authors":"Maria Keinonen","doi":"10.34190/eccws.22.1.1254","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1254","url":null,"abstract":"Cyber deterrence is often studied from the point of view of deterrence by punishment or offensive cyber strategies. A vast amount of studies claim that deterrence in cyberspace can never be successful with cyber means alone due to technical challenges and the problem of attribution. Some scholars argue that cyber resilience is an essential part of cyber deterrence, since not every cyberattack can be countered. These reviews are usually technical and concentrate on investigating the balance of offensive and defensive cyber strategies. The technical view leaves gaps in the physical and cyber-persona layers of cyberspace. This paper examines resilience from a societal perspective and reflects on the findings of cyber deterrence theories. The Concept of Comprehensive Security (CCS) is a Finnish model for building and sustaining resilience in society. Preparation for disruptive situations is carried out with the operating principle of overall safety, where society´s vital functions are protected in collaboration between the authorities, the business world, organisations, and citizens. The growing importance of cyber security has led to emphasising the importance of cyber resilience in the Concept of Comprehensive Security. This study investigates the possibilities to utilize the CCS as a tool for cyber deterrence and aims to create a new perspective on the international academic discussion of cyber deterrence. The research method is content analysis. The investigated material consists of Finnish CCS documents, as well as academic cyber deterrence and cyber resilience literature. The characteristics of the CCS are compared to the factors found in the cyber deterrence material to answer the research question. The key observation presented in this study is that a comprehensive approach to building resilience in the society is essential for the credibility of cyber deterrence. Resilience in cyberspace should be viewed from the perspective of every layer, including logical, physical and cyber-persona layers.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126288917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence Diagrams in Cyber Security: Conceptualization and Potential Applications 网络安全中的影响图:概念和潜在应用
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1303
S. Chockalingam, Clara Maathuis
Over the last years, cyber-attacks are increasing in organizations especially due to the use of emerging technologies and transformation in terms of how we work. Informed decision-making in cyber security is critical to prevent, detect, respond, and recover from cyber-attacks effectively and efficiently. In cyber security, Decision Support System (DSS) plays a crucial role especially in supporting security analysts, managers, and operators in making informed decisions. Artificial Intelligence (AI)-based techniques like Bayesian Networks, Decision Trees are used as an underlying approach in such DSSs. Furthermore, Influence Diagrams (IDs) possess the capability to support informed decision-making based on its existing applications in other domains like medical. However, the complete capability and potential of IDs are not utilised in cyber security especially in terms of its explainable nature for different stakeholders and existing applications in other domains. Therefore, this research tackles the following research question: “What are potential applications of Influence Diagrams (IDs) in cyber security?”. We identified applications of IDs in different domains and then translated it to design potential applications for cyber security issues. In the future, this will help both researchers and practitioners to develop and implement IDs for cyber security-related problems, which in turn will enhance decision-making especially due to its explainable nature for different stakeholders.
在过去的几年里,网络攻击在组织中越来越多,特别是由于新兴技术的使用和我们工作方式的转变。网络安全中的明智决策对于有效和高效地预防、检测、响应和从网络攻击中恢复至关重要。在网络安全领域,决策支持系统(DSS)发挥着至关重要的作用,特别是在支持安全分析师、管理人员和运营商做出明智的决策方面。基于人工智能(AI)的技术,如贝叶斯网络,决策树被用作此类决策支持系统的底层方法。此外,影响图(id)具有基于其在其他领域(如医疗领域)的现有应用程序支持知情决策的能力。然而,id的全部能力和潜力并没有在网络安全中得到利用,特别是就其对不同利益相关者的可解释性和其他领域的现有应用而言。因此,本研究解决以下研究问题:“影响图(id)在网络安全中的潜在应用是什么?”我们确定了id在不同领域的应用,然后将其转化为网络安全问题的潜在应用。在未来,这将有助于研究人员和从业者为网络安全相关问题开发和实施id,这反过来又将加强决策,特别是由于其对不同利益相关者的可解释性。
{"title":"Influence Diagrams in Cyber Security: Conceptualization and Potential Applications","authors":"S. Chockalingam, Clara Maathuis","doi":"10.34190/eccws.22.1.1303","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1303","url":null,"abstract":"Over the last years, cyber-attacks are increasing in organizations especially due to the use of emerging technologies and transformation in terms of how we work. Informed decision-making in cyber security is critical to prevent, detect, respond, and recover from cyber-attacks effectively and efficiently. In cyber security, Decision Support System (DSS) plays a crucial role especially in supporting security analysts, managers, and operators in making informed decisions. Artificial Intelligence (AI)-based techniques like Bayesian Networks, Decision Trees are used as an underlying approach in such DSSs. Furthermore, Influence Diagrams (IDs) possess the capability to support informed decision-making based on its existing applications in other domains like medical. However, the complete capability and potential of IDs are not utilised in cyber security especially in terms of its explainable nature for different stakeholders and existing applications in other domains. Therefore, this research tackles the following research question: “What are potential applications of Influence Diagrams (IDs) in cyber security?”. We identified applications of IDs in different domains and then translated it to design potential applications for cyber security issues. In the future, this will help both researchers and practitioners to develop and implement IDs for cyber security-related problems, which in turn will enhance decision-making especially due to its explainable nature for different stakeholders.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1