Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Gazmend, Huskaj"'
Autor:
Gazmend Huskaj
Publikováno v:
International Conference on Cyber Warfare and Security. 18:476-479
This work-in-progress research product covers Offensive Cyberspace Operations for Cyber Security or “Offensive Defense” for Cyber Security. Offensive cyberspace operations are shrouded in secrecy. From an intelligence perspective, this makes sens
Autor:
Gazmend Huskaj
Publikováno v:
International Conference on Cyber Warfare and Security. 18:152-161
The purpose of this research product is to present the current state of digital geopolitics. Digital Geopolitics is attracting much attention. It features in national digital strategies (for those countries that have those), and there is some researc
Autor:
Gazmend Huskaj
Publikováno v:
International Conference on Cyber Warfare and Security. 17:385-394
This article reviews the question what is a substantial contribution to a research project in offensive cyberspace operations that merits co-authorship? Frustrations and conflicts may develop during research projects when researchers with different b
Autor:
Bengtsson, Johnny, Gazmend, Huskaj
The aim of this article is to present how Chinese strategies are manifested into offensive cyberspace operations targeting Sweden. It is commonly known that People’s Republic of China (PRC, and in this definition the meaning of thegovernment and it
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::28c577633d3df097ce1a07a95ffecc33
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177820
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177820
Autor:
Gazmend Huskaj, Moradian, E.
Publikováno v:
Scopus-Elsevier
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. However, several issues exist when implementing cyber deterrence, which are identified in this paper. The findings show (1) non-existence of the deter
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4a2136c25128951a4263b45a29b82aaf
http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8677
http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8677
Autor:
Gazmend Huskaj
Publikováno v:
Scopus-Elsevier
Cyber-attacks have increased since the 1988-Morris worm and can target any connected device from any place in the world. In 2010, Stuxnet received a lot of attention as the first cyber-weapon. Its targets were the Iranian nuclear enrichment centrifug
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::323e3a2676e40809d8d97802218ef832
http://www.scopus.com/inward/record.url?eid=2-s2.0-85069999780&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85069999780&partnerID=MN8TOARS