Contemporary Security Policy,
Journal Year:
2023,
Volume and Issue:
44(3), P. 437 - 461
Published: May 25, 2023
Zero-day
vulnerabilities
are
software
and
hardware
flaws
that
unknown
to
computer
vendors.
As
powerful
means
of
carrying
out
cyber
intrusions,
such
present
a
dilemma
for
governments.
Actors
develop
or
procure
may
retain
them
future
use;
alternatively,
agencies
possessing
disclose
the
affected
vendors
so
they
can
be
patched,
thereby
denying
not
only
adversaries
but
also
themselves.
Previous
research
has
explored
ethics
implications
this
dilemma,
no
study
investigated
public
opinion
regarding
zero-day
exploits.
We
results
from
survey
experiment
testing
whether
conditions
identified
as
important
in
literature
influence
respondents’
support
disclosing
stockpiling
vulnerabilities.
Our
show
respondents
overwhelmingly
disclosure,
conclusion
weakly
by
likelihood
an
adversary
will
independently
discover
vulnerability.
findings
suggest
gap
between
preferences
current
U.S.
policy.
Computer Science & IT Research Journal,
Journal Year:
2024,
Volume and Issue:
5(2), P. 254 - 269
Published: Feb. 2, 2024
The
rapid
urbanization
and
digital
transformation
of
cities
across
Africa
have
given
rise
to
the
concept
Smart
Cities,
where
advanced
technologies
are
integrated
enhance
efficiency,
sustainability,
overall
quality
urban
life.
However,
this
paradigm
shift
towards
interconnected
technology-driven
environments
brings
forth
a
host
cybersecurity
challenges
that
demand
careful
consideration.
This
paper
explores
in
focusing
on
case
review
African
metropolises.
cities,
emblematic
global
trend,
embracing
City
initiatives
address
foster
economic
development.
While
these
promise
improved
services
enhanced
connectivity,
they
concurrently
expose
myriad
threats.
interconnectedness
devices
systems
Cities
creates
vast
attack
surface,
making
them
susceptible
cyber-attacks
ranging
from
data
breaches
infrastructure
disruptions.
delves
into
specific
instances
faced
by
metropolises
their
quest
for
technological
advancement.
It
analyzes
vulnerabilities
critical
infrastructure,
such
as
energy
grids,
transportation
systems,
healthcare
networks,
highlighting
potential
risks
associated
with
inadequate
measures.
Moreover,
sheds
light
socio-economic
implications
cyber
threats
emphasizing
importance
resilient
frameworks
safeguarding
citizen
functionality.
In
conclusion,
underscores
urgent
need
comprehensive
strategies
tailored
unique
Africa.
findings
aim
contribute
better
understanding
intricate
relationship
between
urbanization,
technology,
cybersecurity,
offering
insights
can
inform
policy
decisions,
implementations,
collaborative
efforts
build
secure
context.
Keywords:
Cybersecurity,
Africa,
Metropolis,
Review.
Journal of Global Security Studies,
Journal Year:
2022,
Volume and Issue:
8(1)
Published: Dec. 19, 2022
Abstract
To
what
extent
can
cyberattacks
wreak
havoc
and
terrorize
modern
society?
Until
now,
this
question
has
revolved
around
the
potential
of
cyber
operations
to
cause
physical
destruction
or
other
material
harm.
In
paper,
we
propose
a
broader
interpretation.
We
submit
that
assessing
cyber-threats
through
prism
obscured
human
dimension
threat.
Instead,
calculating
gravity
by
measuring
psychological
distress.
This
approach
recognizes
even
seemingly
inconsequential
levy
tremendous
damage
traumatizing
civilians,
undermining
societal
cohesion,
exacerbating
cycles
violence.
test
whether
significant
individual
harm,
employ
an
internal
meta-analysis
looking
at
eighteen
studies
conducted
in
three
countries
over
6
years.
Across
these
studies,
exposed
6,020
respondents
simulated
conventional
attacks.
conclude
high
levels
harm—equal
caused
political
violence
terrorism.
finding
overturns
widely
accepted
view
are
mere
irritant
best
threat
information
security
worst.
Through
lens,
findings
suggest
nonphysically
destructive
trigger
consequences
constitute
legally
defined
armed
attack
permits
using
force
self-defense.
discussing
how
onset
distress
generates
pressure
support
retaliation
lead
military
escalation.
Journal of Peace Research,
Journal Year:
2024,
Volume and Issue:
61(1), P. 3 - 9
Published: Jan. 1, 2024
Investigating
cyber
conflict
is
enormously
difficult.
The
domain
complex,
quality
data
are
sparse,
international
affairs
shrouded
in
secrecy,
and
despite
its
seeming
ubiquity,
power
has
only
recently
entered
the
battlefield.
In
face
of
these
challenges,
we
must
rise
to
meet
challenges
cybersecurity
research
by
deploying
creative
methods
that
collect
verifiable
probatory
data,
which
allow
for
predictive
models
behavior.
Against
this
backdrop,
our
special
issue
offers
a
vision
embraces
culture
rigorous
inquiry
based
on
theoretically
robust,
policy
relevant
investigation.
We
highlight
two
key
features.
First,
at
intersection
political
science
incorporate
human
dimension
conflict.
A
security
approach
places
people
as
primary
objects
recognizes
individual-level
analyses
can
shed
light
macro-level
trends.
Second,
adopt
rigorous,
empirical
methods.
embrace
broad
tent
collection
techniques
–
spanning
qualitative
quantitative,
experimental,
observational
research.
What
integral
all
scholarship
abides
highest
standards
replicability
falsifiability.
articles
contained
collectively
form
proof
concept
expands
horizons
from
substantive
viewpoint
(adding
prevalent
military/strategic
analyses),
methodological
perspective
(propounding
importance
scrutiny).
Together,
10
pieces
affirm
there
now
critical
mass
substantively
diverse
empirically
field
cybersecurity,
community
capable
making
bold,
grounded,
tested
claims
verify
how
or
not
altering
nature
peace,
relations.
Journal of Peace Research,
Journal Year:
2024,
Volume and Issue:
61(1), P. 103 - 118
Published: Jan. 1, 2024
When
it
comes
to
cybersecurity
incidents
–
public
opinion
matters.
But
how
do
voters
form
opinions
in
the
aftermath
of
cyberattacks
that
are
shrouded
ambiguity?
How
people
account
for
uncertainty
inherent
cyberspace
forge
preferences
following
attacks?
This
article
seeks
answer
these
questions
by
introducing
an
threshold
mechanism
predicting
level
attributional
certainty
required
support
economic,
diplomatic
or
military
responses
cyberattacks.
Using
a
discrete-choice
experimental
design
with
2025
US
respondents,
we
find
lower
is
associated
less
retaliation,
yet
this
contingent
on
suspected
identity
attacker
and
partisan
identity.
Diplomatic
allies
possess
reservoir
good
will
amplifies
effect
uncertainty,
while
rivals
often
given
benefit
doubt.
We
demonstrate
encourages
use
cognitive
schemas
overcome
ambiguity,
fall
back
upon
pre-existing
politically
guided
views
about
country
behind
attack.
If
ambiguity
surrounding
has
typically
been
discussed
as
operational
strategic
concern,
shifts
focus
attention
human
positions
mass
forgotten
important
party
during
cyber
conflict.
International Cybersecurity Law Review,
Journal Year:
2024,
Volume and Issue:
5(1), P. 169 - 212
Published: Feb. 2, 2024
Abstract
Cybersecurity
investments
are
made
within
a
complex
and
ever-evolving
environment,
where
regulatory
changes
represent
significant
risk
factor.
While
cybersecurity
regulations
aim
to
minimize
cyber
risks
enhance
protection,
the
uncertainty
arising
from
frequent
or
new
can
significantly
impact
organizational
response
strategies.
This
paper
explores
determinants
implications
of
associated
with
cybersecurity,
aiming
provide
deeper
understanding
how
these
influence
strategic
decision-making.
The
study
delves
into
suggestion
preventive
mitigative
controls
that
enable
businesses
adapt
mitigate
potential
disruptions
caused
by
changes,
thereby
preserving
their
established
practices.
Another
key
contribution
this
is
introduction
stochastic
econometric
model
illustrates
uncertainties
affect
investment
behaviors,
often
prompting
“wait-and-see”
stance.
synthesizes
relationship
among
choices,
risks,
providing
insights
dynamic
nature
research
findings
offer
valuable
guidance
for
management
planning
in
investments.
By
comprehensively
drivers
impacts
policymakers
develop
more
effective
evaluation
approaches.
essential
sustaining
strong
posture
while
navigating
changing
environment.
IEEE Access,
Journal Year:
2023,
Volume and Issue:
11, P. 62697 - 62720
Published: Jan. 1, 2023
The
smart
grid
relies
on
Advanced
Metering
Infrastructure
(AMI)
to
function.
Because
of
the
significant
packet
loss
and
slow
transmission
rate
wireless
connection
between
meters
in
AMI,
these
infrastructures
are
considered
Low-power
Lossy
Networks
(LLNs).
routing
protocol
an
AMI
network
is
crucial
for
ensuring
availability
timeliness
data
transfer.
IPv6
Routing
Protocol
lossy
networks
(RPL)
excellent
option
communication
configuration.
However,
it
highly
at
risk
against
many
external
internal
attacks,
its
effectiveness
may
be
severely
diminished
by
Sybil
assault.
Different
trust-based
techniques
have
been
suggested
mitigate
attacks.
existing
trust
systems
high
energy
consumption
issues,
which
cause
a
reduction
performance
LLNs
due
complex
calculations
node
level.
Therefore,
this
paper
presents
novel
fog-enabled
GINI
index-based
mechanism
(GITM)
attacks
using
forwarding
behavior
legitimate
member
nodes.
Regarding
identifying
isolating
assaults,
our
approach
outperforms
state-of-the-art
methods.
GITM
detects
isolates
more
number
malicious
nodes
compared
other
within
similar
time
frame.
By
proposed
framework,
attack
detection
increases
4.48%,
reduces
21%,
isolation
latency
26.30%
(concerning
time).
Furthermore,
end-to-end
delay
merely
0.30%
case,
control
messages
decreases
28%.
Journal of Peace Research,
Journal Year:
2024,
Volume and Issue:
61(1), P. 10 - 27
Published: Jan. 1, 2024
Russia’s
cyber-enabled
influence
operations
(CEIO)
have
garnered
significant
public,
academic
and
policy
interest.
126
million
Americans
were
reportedly
exposed
to
efforts
the
2016
US
election
on
Facebook.
Indeed,
extent
that
such
shape
political
outcomes,
they
may
prove
far
more
consequential
than
other,
flamboyant
forms
of
cyber
conflict.
Importantly,
CEIOs
highlight
human
dimension
Focused
‘hacking
minds’
affecting
individuals
behind
keyboards,
as
opposed
hacking
networked
systems,
represent
an
emergent
form
state
activity.
data
for
studying
are
often
publicly
available.
We
employ
semantic
network
analysis
(SNA)
assess
seldom
analyzed
in
cybersecurity
research
–
text
actual
advertisements
from
a
prominent
CEIO.
examine
content,
well
scope
scale
Russian-orchestrated
social
media
campaign.
While
described
‘disinformation,’
our
shows
information
utilized
Russian
CEIO
was
generally
factually
correct.
Further,
it
appears
African
Americans,
not
white
conservatives,
target
demographic
Russia
sought
influence.
conclude
with
speculation,
based
findings,
about
likely
motives
Journal of Global Security Studies,
Journal Year:
2024,
Volume and Issue:
9(2)
Published: March 12, 2024
Abstract
Proximity
is
a
core
feature
of
theories
political
violence,
with
the
effects
attacks
rippling
outward
so
that
geographically
proximate
individuals
experience
more
severe
than
those
distant.
However,
this
model
proximity
and
exposure
unlikely
to
recur
for
cyberattacks.
The
incorporeality
cyber
incidents
absence
physical
epicenter
constrain
mechanism
coupling
distance
harm.
To
empirically
test
relationship
between
cyberattacks,
we
conducted
field
study
involving
707
German
respondents
following
ransomware
attack
in
Düsseldorf.
We
find
classical
“ripple
effect”
reversed,
trust
highest
among
people
closer
lowest
postulate
firsthand
its
effects,
distant
employ
abstract
conceptions
consequences
do
not
align
actual
events.
Consequently,
does
confer
security,
it
can
even
amplify
adverse
exposure.
This
finding
highlights
need
governments
actively
work
assuage
public
fears
Scandinavian Actuarial Journal,
Journal Year:
2023,
Volume and Issue:
2023(10), P. 1000 - 1021
Published: April 25, 2023
Not
a
day
goes
by
without
news
about
cyber
attack.
Fear
spreads
out
and
lots
of
wrong
ideas
circulate.
This
survey
aims
at
showing
how
all
these
uncertainties
can
be
transformed
into
manageable
risk.
After
reviewing
the
main
characteristics
risk,
we
consider
three
layers
space:
hardware,
software
psycho-cognitive
layer.
We
ask
ourselves
is
this
risk
different
from
others,
modelling
has
been
tackled
needs
to
evolve,
what
are
multi-facetted
aspects
management.
wide
exploration
pictures
science
in
making
points
questions
solved
for
building
resilient
society.
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: Jan. 14, 2025
The
application
of
artificial
neural
networks
(ANNs)
can
be
found
in
numerous
fields,
including
image
and
speech
recognition,
natural
language
processing,
autonomous
vehicles.
As
well,
intrusion
detection,
the
subject
this
paper,
relies
heavily
on
it.
Different
detection
models
have
been
constructed
using
ANNs.
While
ANNs
are
relatively
mature
to
construct
models,
some
challenges
remain.
Among
most
notorious
these
bloated
caused
by
large
number
parameters,
non-interpretability
models.
Our
paper
presents
Convolutional
Kolmogorov-Arnold
Networks
(CKANs),
which
designed
overcome
difficulties
provide
an
interpretable
accurate
model.
(KANs)
developed
from
representation
theorem.
Meanwhile,
CKAN
incorporates
a
convolutional
computational
mechanism
based
KAN.
model
proposed
is
incorporating
attention
mechanisms
into
CKAN's
logic.
datasets
CICIoT2023
CICIoMT2024
were
used
for
training
validation.
From
results
evaluating
performance
indicators
experiments,
CKANs
has
attractive
prospect.
compared
with
other
methods,
predict
much
higher
level
accuracy
significantly
fewer
parameters.
However,
it
not
superior
terms
memory
usage,
execution
speed
energy
consumption.