Skip to contentHelp us improve by providing feedback or contacting help@jisc.ac.uk
  • Browse
  • Publish
Sign in with ORCID

Cyber warfare

Research Topic

Language: English

Sign in for more actions

This is a research topic created to provide authors with a place to attach new problem publications.

Research topics above this in the hierarchy

  • Military Science

Research problems linked to this topic

  • Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?
  • Preventing criminal, hostile or mischievous use of autonomous and unmanned systems, or attacks of the systems themselves, especially through “security by design”.

Octopus

Contact us: help@jisc.ac.uk

Browse

Publish

About

FAQs

Get involved

Terms

Privacy

Accessibility

Cookie Policy

In partnership with

Jisc Logo

With support from

UKRI

A collaboration with

Jisc Logo