From cyber terrorism to cyber peacekeeping: are we there yet?

M Papathanasaki, G Dimitriou, L Maglaras… - Proceedings of the 24th …, 2020 - dl.acm.org
In Cyberspace nowadays, there is a burst of information that everyone has access. However,
apart from the advantages the Internet offers, it also hides numerous dangers for both …

Threats, countermeasures and attribution of cyber attacks on critical infrastructures

L Maglaras, M Ferrag, A Derhab, M Mukherjee… - … Transactions on Security …, 2018 - eudl.eu
Abstract As Critical National Infrastructures are becoming more vulnerable to cyber attacks,
their protection becomes a significant issue for any organization as well as a nation …

Threats, protection and attribution of cyber attacks on critical infrastructures

L Maglaras, MA Ferrag, A Derhab, M Mukherjee… - arXiv preprint arXiv …, 2019 - arxiv.org
As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their
protection becomes a significant issue for any organization as well as a nation. Moreover …

Developing cyber peacekeeping: Observation, monitoring and reporting

M Robinson, K Jones, H Janicke, L Maglaras - Government Information …, 2019 - Elsevier
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With
cyber warfare increasingly becoming part of future conflicts, new and novel solutions are …

Cyber security: From regulations and policies to practice

L Maglaras, MA Ferrag, A Derhab, M Mukherjee… - … Marketing and Tourism …, 2019 - Springer
The major target of cyber attacks is a country's Critical National Infrastructure (CNI) such as
ports, hospitals, water, gas or electricity producers, which use and rely upon Supervisory …

Identity Management as a target in cyberwar

L Fritsch - 2020 - dl.gi.de
This article will discuss Identity Management (IdM) and digital identities in the context of
cyberwar. Cyberattacks that target or exploit digital identities in this context gain leverage …

Efforts to overcome cyber crime actions in Indonesia

M Hatta, R Rajamanickam, D Abdullah… - Journal of Physics …, 2018 - iopscience.iop.org
The presence of the internet can penetrate the boundaries between countries and
accelerate the spread and exchange of information throughout the world. Although there are …

Managing Professional-Ethical Negotiation for Cyber Conflict Prevention: Perspectives From Higher Institution Learners in the Pandemic Age

A Hadi, M Huda, N Lyndon, BM Nasir - International Journal of Cyber …, 2024 - igi-global.com
This article aims to investigate the professional and ethical negotiation on managing cyber
conflict prevention towards misuse and exploitation of massive social media adoption from …

Cybersecurity assessment of the public sector in Greece

G Drivas, L Maglaras, H Janicke… - ECCWS 2019 18th …, 2019 - books.google.com
Organizations have to manage new risks, sometimes proactively, sometimes by being
constrained by regulations such as GDPR or the NIS directive. To cope with new threats, it is …

From Rules to Retribution: The Problem of Attribution and Regulation in the Age of Cyberwarfare

N Downes, L Maglaras - Hybrid Threats, Cyberterrorism and …, 2024 - taylorfrancis.com
Even though we have been aware of cyberwarfare for a number of decades, our current
reality is still naïve. One cannot help but draw parallels to the early ignorance of nuclear …