Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (7)
- Computer Engineering (6)
- Computer and Systems Architecture (6)
- Digital Communications and Networking (6)
- Engineering (6)
-
- Military, War, and Peace (6)
- Other Computer Engineering (6)
- Computer Law (5)
- Intellectual Property Law (5)
- National Security Law (5)
- Political Science (5)
- Systems Science (5)
- International Relations (4)
- Arts and Humanities (3)
- History (3)
- Holocaust and Genocide Studies (3)
- Cognitive Psychology (2)
- Cognitive Science (2)
- Courts (2)
- Criminal Law (2)
- International Humanitarian Law (2)
- International Law (2)
- International and Area Studies (2)
- Psychology (2)
- Soviet and Post-Soviet Studies (2)
- Comparative and Foreign Law (1)
- Conflict of Laws (1)
- Constitutional Law (1)
- European History (1)
- Keyword
-
- Cybersecurity (2)
- Russia (2)
- Adversarial machine learning (1)
- Biomanufacturing (1)
- Bosnia and Herzegovina (1)
-
- Cell Therapy (1)
- Chinese Commercial Enablers (1)
- Collegiate education (1)
- Commercialization (1)
- Complementarity (1)
- Constitutional Court (1)
- Courts (1)
- Cyber Intelligence (1)
- Cyberattacks (1)
- Decentralization of powers (1)
- Deep learning (1)
- Digital Twins (1)
- Dual-use (1)
- Education (1)
- Ethical hacking (1)
- Ethics (1)
- Fault Detection (1)
- Federalism (1)
- Federalization of the police (1)
- Genocide (1)
- Genocide denial ban (1)
- Georgia (1)
- Hacking (1)
- High Representative (1)
- Hinterland Securities (1)
Articles 1 - 10 of 10
Full-Text Articles in Law
Genocide Memorialization Through Law In Bosnia And Herzegovina: Reconciling The Irreconcilable?, Carna Pistan
Genocide Memorialization Through Law In Bosnia And Herzegovina: Reconciling The Irreconcilable?, Carna Pistan
Genocide Studies and Prevention: An International Journal
This article focuses on the law banning genocide denial and other war crimes and the glorification of convicted war criminals imposed in Bosnia and Herzegovina by the former High Representative Valentin Inzko in mid-2021 to facilitate the country’s reconciliation process. It first positions the genocide denial ban into the vast category of memory laws by examining its content and scope, as well as the reactions and consequences it has provoked up to now. The article maintains that an internationally imposed memory law cannot create reconciliation in a deeply divided society. It shows, on the contrary, that the imposed legislation has …
Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese
Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese
Genocide Studies and Prevention: An International Journal
In August 2008, just days after belligerent parties had reached a ceasefire agreement, the Office of the Prosecutor (OTP) announced the opening of a preliminary examination into the situation of Georgia. Yet, it was only in March 2022 that International Criminal Court (ICC) Chief Prosecutor Karim Khan applied for arrest warrants in relation to three individuals from Georgia’s breakaway region of South Ossetia. That said, how can such prolonged inaction be accounted for? How much blame does the OTP carry for it? And how did ICC-state relations develop over time? This paper conducts a within-case analysis of the situation of …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt
“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt
Genocide Studies and Prevention: An International Journal
This article exposes the political underpinnings of the term “genocide of the Soviet people,” introduced and actively promoted in Russia since 2019. By reclassifying mass crimes committed by the Nazis and their accomplices against the civilian population—specifically Slavic—as genocide, Russian courts effectively engage in adjudication of the history of the Second World War. In the process, genocide trials, ongoing in twenty-five Russian provinces and five occupied Ukrainian territories, present no new evidence or issue new indictments, thus fulfilling none of the objectives of a standard criminal investigation. The wording of the verdicts, and a comprehensive political project put in place …
Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu
Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu
Journal of African Conflicts and Peace Studies
The structure of the Nigerian police has overtime depicted a centralized composition that negate principles of power sharing in a federal system of government. The complexities and diverse nature of policing in Nigeria remains the bane to effective and virile administration and management of the organization. The office of the Commissioner of Police vis-à-vis those of State Governors spell contradictions in power configuration from both the Constitution and the Police Act. The enactment of vigilante services and neighbourhood watches by state governments are indicative of a failing security system especially at the component units of the Nigerian federation. The hinterlands …