Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
115
result(s) for
"Cyberterrorism -- China"
Sort by:
Chinese cybersecurity and defense
by
Ventre, Daniel
in
Computer security
,
Computer security -- China
,
Cyber intelligence (Computer security)
2014,2015
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the \"Chinese threat.\" It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension:
Is Cyberspace changing the scene of international relations?
How China does apprehend cybersecurity and cyberdefense?
What are the issues, challenges?
What is the role of China in the global cyberspace?
Research and Prospect of Defense for Integrated Energy Cyber–Physical Systems Against Deliberate Attacks
2025
The tight integration of cyber and physical networks in integrated energy cyber–physical systems (IECPS) improves system awareness and coordinated control but also heightens susceptibility to targeted attacks. A robust IECPS defense system is crucial for increasing the system’s resilience against deliberate attacks. Reducing the associated risks is essential to ensure the safe and stable operation of IECPS. In order to enhance the defense capability of IECPS against deliberate attacks, this paper discusses cyberattacks, physical attacks, and coordinated cyber physical attacks (CCPAs) in detail. The attack principles and attack models of each type of attack are described, and then the intentional attack threats faced by IECPS are analyzed. Based on this, the paper reviews the current research landscape regarding countermeasures against deliberate attacks, categorizing the findings into three key areas: preemptive prevention, process response, and post–event recovery and summarizing. The theoretical foundations, system planning, optimal scheduling, and cyber security technologies required for existing defense research are further elaborated. The unresolved issues within these key technologies are analyzed and summarized, followed by the presentation of the problems and challenges faced in defending against deliberate IECPS attacks.
Journal Article
Management Economic Systems and Governance to Reduce Potential Risks in Digital Silk Road Investments: Legal Cooperation between Hainan Free Trade Port and Ethiopia
by
Wang, Shumin
,
Li, Qianyu
,
Khaskheli, Muhammad Bilawal
in
Communications networks
,
Connectivity
,
Cooperation
2024
This research explores the interplay between innovation, economic systems, governance structures, and law, and how they interact with one another in the context of China and Ethiopia’s investments in the Digital Silk Road. The way cutting-edge methods related to governance and economic systems might help lower the risks involved in major infrastructure projects, like the Digital Silk Road, particularly in light of law and 5G developments, is investigated. China–Africa connections are to be strengthened, sustainable development is to be encouraged, and healthy economic progress is the goal of the partnership between Ethiopia and the Hainan Free Trade Port. The impact of these transnational investments on fair growth and sustainable development is assessed, while exploring the evolving agendas and procedures governing investments. This research draws attention to how the law and legal cooperation between Ethiopia and China may promote mutually advantageous outcomes, promote transparency and governance mechanisms, and lessen the likelihood of disputes. This research on the factors influencing the future of the Digital Silk Road and its consequences for long-term, sustainable economic growth, and business in the area, aims to provide valuable insights for policymakers, development professionals, and academics, and for the copromotion of China and Ethiopia in terms of digital investment. This research relates to the promotion of the African Continental Free Trade Area (AfCFTA), in terms of construction and economic development. It also examines how the DSR raises concerns about data security and privacy, cross-border transactions, technology transfer, and cyberterrorism, as well as encourages digital investment, such as through enhancing digital governance regulations, modernizing international investment agreements (IIAs), and bolstering global health, coordination, and cooperation; the article concludes by analyzing the implications for Africa. The findings show that such cooperation would support Africa’s digital transformation and sustainable development, while strengthening China–Africa cooperation.
Journal Article
Cyber, Geopolitical, and Financial Risks in Rare Earth Markets: Drivers of Market Volatility
by
Panazan, Oana
,
Calefariu Giol, Emilia
,
Gheorghe, Catalin
in
Alternative energy
,
Alternative energy sources
,
California
2025
This study examines the integrated impacts of cyberattacks, geopolitical, and financial market volatility on rare earth markets during the 2014–2024 period, using Time-Varying Parameter Vector Autoregression and wavelet analysis. By bridging critical gaps in the literature, this research provides a comprehensive framework for understanding the compounded effects of emerging risks on market dynamics. The analysis includes key market indices (SOLLIT, PICK, SPGSIN, GSPTXGM, MVREMXTR, and XME), alongside green energy prices, to capture cross-market dependencies. The findings reveal that financial volatility exerts the most persistent long-term influence, while geopolitical events, such as the US-China trade tensions and the Ukraine conflict, trigger significant market disruptions. Cyberattacks, although episodic, exacerbate short-term volatility, especially during global crises. Rising green energy prices further amplify vulnerabilities in supply chains, underscoring the interconnectedness of rare earth markets and the sustainable energy transition. This research provides actionable insights for integrated risk management strategies, emphasizing supply chain diversification, enhanced cybersecurity, and international cooperation to ensure market stability and resilience in the energy transition.
Journal Article
Bridging the Cybersecurity Gap: A Comprehensive Analysis of Threats to Power Systems, Water Storage, and Gas Network Industrial Control and Automation Systems
2024
This research addresses the dearth of real-world data required for effective neural network model building, delving into the crucial field of industrial control and automation system (ICS) cybersecurity. Cyberattacks against ICS are first identified and then generated in an effort to raise awareness of vulnerabilities and improve security. This research aims to fill a need in the existing literature by examining the effectiveness of a novel approach to ICS cybersecurity that draws on data from real industrial settings. Real-world data from a variety of commercial sectors is used in this study to produce a complete dataset. These sectors include power systems, freshwater tanks, and gas pipelines, which together provide a wide range of commercial scenarios where anomaly detection and attack classification approaches are critical. The generated data are shown to considerably improve the models’ precision. An amazing 71% accuracy rate is achieved in power system models, and incorporating generated data reliably increases network speed. Using generated data, the machine learning system achieves an impressive 99% accuracy in a number of trials. In addition, the system shows about 90% accuracy in most studies when applied to the setting of gas pipelines. In conclusion, this article stresses the need to improve cybersecurity in vital industrial sectors by addressing the dearth of real-world ICS data. To better understand and defend against cyberattacks on industrial machinery and automation systems, it demonstrates how generative data can improve the precision and dependability of neural network models.
Journal Article
Novel Application of Open-Source Cyber Intelligence
2023
The prevalence of cybercrime has emerged as a critical issue in contemporary society because of its far-reaching financial, social, and psychological implications. The negative effects of cyber-attacks extend beyond financial losses and disrupt people’s lives on social and psychological levels. Conventional practice involves cyber experts sourcing data from various outlets and applying personal discernment and rational inference to manually formulate cyber intelligence specific to a country. This traditional approach introduces personal bias towards the country-level cyber reports. However, this paper reports a novel approach where country-level cyber intelligence is automatically generated with artificial intelligence (AI), employing cyber-related social media posts and open-source cyber-attack statistics. Our innovative cyber threat intelligence solution examined 37,386 tweets from 30,706 users in 54 languages using sentiment analysis, translation, term frequency–inverse document frequency (TF-IDF), latent Dirichlet allocation (LDA), N-gram, and Porter stemming. Moreover, the presented study utilized 238,220 open-intelligence cyber-attack statistics from eight different web links, to create a historical cyber-attack dataset. Subsequently, AI-based algorithms, like convolutional neural network (CNN), and exponential smoothing were used for AI-driven insights. With the confluence of the voluminous Twitter-derived data and the array of open-intelligence cyber-attack statistics, orchestrated by the AI-driven algorithms, the presented approach generated seven-dimensional cyber intelligence for Australia and China in complete automation. Finally, the topic analysis on the cyber-related social media messages revealed seven main themes for both Australia and China. This methodology possesses the inherent capability to effortlessly engender cyber intelligence for any country, employing an autonomous modality within the realm of pervasive computational platforms.
Journal Article
Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups
2022
North Korean cyber-attack groups such as Kimsuky, Lazarus, Andariel, and Venus 121 continue to attempt spear-phishing APT attacks that exploit social issues, including COVID-19. Thus, along with the worldwide pandemic of COVID-19, related threats also persist in cyberspace. In January 2022, a hacking attack, presumed to be Kimsuky, a North Korean cyber-attack group, intending to steal research data related to COVID-19. The problem is that the activities of cyber-attack groups are continuously increasing, and it is difficult to accurately identify cyber-attack groups and attack origins only with limited analysis information. To solve this problem, it is necessary to expand the scope of data analysis by using BGP archive data. It is necessary to combine infrastructure and network information to draw correlations and to be able to classify infrastructure by attack group very accurately. Network-based infrastructure analysis is required in the fragmentary host area, such as malware or system logs. This paper studied cyber ISR and BGP and a case study of cyber ISR visualization for situational awareness, hacking trends of North Korean cyber-attack groups, and cyber-attack tracking. Through related research, we estimated the origin of the attack by analyzing hacking cases through cyber intelligence-based profiling techniques and correlation analysis using BGP archive data. Based on the analysis results, we propose an implementation of the cyber ISR visualization method based on BGP archive data. Future research will include a connection with research on a cyber command-and-control system, a study on the cyber battlefield area, cyber ISR, and a traceback visualization model for the origin of the attack. The final R&D goal is to develop an AI-based cyber-attack group automatic identification and attack-origin tracking platform by analyzing cyber-attack behavior and infrastructure lifecycle.
Journal Article
Digital Economy and Cybersecurity in Nigeria: Policy Implications For Development
by
Williams, Ifeanyi Solomon
,
Ukwuoma, Henry Chima
,
Choji, Ibrahim Dinju
in
Borders
,
China
,
Companies
2022
The COVID-19 pandemic has resulted in the urgent need for the Nigerian Government to embrace digital economy at all cost. Countries with digitised economy have been able to easily adopt to the challenges that the pandemic has brought, such as eLearning for the education sector and e-business for the business sector. Although, this innovation comes along with a lot of cyber-attacks by cybercriminals resulting for the need to establish adequate cybersecurity measures. Nigeria has gravely felt the impact of the COVID-19, businesses have been shut, countries have shut their borders, thus making it impossible for Nigerian Government/Businesses to access other country's products most especially China. The paper reviews the digital economy of some developed nations and their cybersecurity measures to sustain this innovation. The study further highlights how digital economy has contributed to the Gross Domestic product of most Nations, thus serving a means of diversification for most nations.
Journal Article
Shared Cybersecurity Risk Management in the Industry of Medical Devices
2021
The cybersecurity capabilities of Class 1 medical devices must be seriously addressed when the industry moves toward Industry 4.0. Many U.S. manufacturers are not committed to cybersecurity risk management because they pursue lower cost and shorter product life cycles, do not have sufficient knowledge of operating environments of hospitals, have defensive attitudes toward vulnerability disclosure, and reap quick benefits from the low-trust level among stakeholders and the unequal power between manufacturers and distributors. Only a few large U.S. manufacturers of medical devices have set up robust secure platforms and interoperable optimal standards that can elevate the security practices of entire global supply chain of Class 1 devices. Many small and medium-sized enterprises inside and outside the U.S. need to be equipped to co-foster cybersecurity values with large manufacturers through the coordination between government and industry regulations and the support of international organizations and local government policies.
Journal Article