News
D-ARCH Architecture D-BAUG Civil, Environmental and Geomatic Engineering D-BIOL Biology D-BSSE Biosystems Science and Engineering D-CHAB Chemistry and Applied Biosciences D-EAPS Earth and Planetary ...
Foreign and Security Policies as a Legal Problem between Center and Regions Author(s): Mikhail Rykhtik, Alexander Sergounin Series: Project Regionalization of Russian Foreign and Security Policy ...
Digital extortion, with ransomware as its most prominent form, has become one of the most disruptive cyber threats in recent years. Ransomware locks access to systems or data until a ransom is paid, ...
This research project examines how various groups conduct cyber operations and the organizational structures that support them. Its value lies in the in-depth exploration of the role cyber effect ...
Edward Jackson is a Senior Program Officer in the Mediation Support Team at the Center for Security Studies (CSS), ETH Zurich. He works on the Ceasefire Project - a joint initiative with the Centre ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Understanding, “right-sizing,” and adequately respecting the role of value systems in conflict transformation avoids both over- and under-emphasis. It aims at a better understanding of the interplay ...
In South-East Asia, the escalating US-China conflict is clearly moving into the spotlight. China and the US have incompatible goals and ideas about the political order and view each other as potential ...
external page To the Publication Deterrence theory helps conceptualize how threats can be used and communicated to influence or alter an adversary’s behavior. Deterrence by denial reduces the ...
In 2023, the world celebrates the 75th anniversary of UN peacekeeping. It was in the Arab-Israeli war in 1948 that the UN first tested the seemingly outlandish idea of sending soldiers not to wage war ...
The spectre of Russian “hybrid war” continues to haunt defense planners and audiences in the West. Digital disinformation campaigns are held to be a central means of waging such wars, extending a ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results