Proceedings of the conference Behind the Digital Curtain

Proceedings of the conference Behind the Digital Curtain

[wonderplugin_pdf src="https://www.promoteukraine.org/dirwp-content/uploads/2019/07/BEHIND-THE-DIGITAL-CURTAIN.-CIVIL-SOCIETY-VS-STATE-SPONSORED-CYBER-ATTACKS.-Proceedings-of-the-conference.-Promote-Ukraine.pdf" width="100%" height="700px" style="border:0; background:#3E9CD4;"] [siteorigin_widget class="AMP_Widget_Text"][/siteorigin_widget]
About Behind the Digital Curtain

About Behind the Digital Curtain

A hybrid war of Russia against Ukraine and Europe, the cyber-meddling into modern democracies, cyber hygiene and effective methods to counteract. All these issues have been raised during the international conference "Behind the digital curtain" in […]
Behind the Digital Curtain in Pictures

Behind the Digital Curtain in Pictures

On 25 June 2019, Promote Ukraine (PU) had the pleasure of holding the conference – Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks. The conference brought together experts from various European countries, […]
A look inside the Russian Information War

A look inside the Russian Information War

Barandiy Marta "Behind the digital curtain: A look inside the Russian Information War against the West" - DOI 10.34054/bdc001 in:  Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels - 25/06/2019 - DOI 10.34054/bdc000 Download the […]
A Fast Empirical Method for Detecting Fake News

A Fast Empirical Method for Detecting Fake News

Monastyrskyi Liubomyr, Boyko Yaroslav, Sokolovskyi Bohdan, Sinkevych Oleh A Fast Empirical Method for Detecting Fake News on Propagandistic News Resources - DOI 10.34054/bdc009 in:  Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels […]
Extraction, integration and data processing in the SIEM «SPLUNK»

Extraction, integration and data processing in the SIEM «SPLUNK»

Petro Venherskyi, Roman Karpiuk Extraction, integration and data processing in the SIEM «SPLUNK» using «NESSUS» vulnerability scanner - DOI 10.34054/bdc002 in:  Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels - 25/06/2019 - DOI 10.34054/bdc000 […]
Autonomous Weapons, Cyberattacks, and AI

Autonomous Weapons, Cyberattacks, and AI

Kotsiuba Igor Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI. DOI 10.34054/bdc004 in: Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels - 25/06/2019 - DOI 10.34054/bdc000 Download the Publication here:   Igor Kotsiuba - […]
Modern Cyber Weaponry

Modern Cyber Weaponry

Modern Cyber Weaponry and the “Weaponization” of Ideas: How Elections are Transformed into Cyber Operations Authors: Marta Barandiy, Viktoria Shestoperova, Yuliya Shutyak Download Publication here: Modern Cyber Weaponry The history of Russian hacking. The Gerasimov doctrine and the […]
The Kremlin’s cyber contractors

The Kremlin’s cyber contractors

The Kremlin’s cyber contractors. What motives? What risks? The Kremlin’s cyber army has become a formidable threat around the globe, with cyberattacks targeting not only states but also private companies. The cyberspace is still pretty […]
12