:::

詳目顯示

回上一頁
題名:以色列8200網路間諜部隊對我國省思
書刊名:國防雜誌
作者:張哲鐘彭群堂
作者(外文):Chang, Che-chungPeng, Chun-tang
出版日期:2022
卷期:37:3
頁次:頁33-54
主題關鍵詞:以色列8200部隊資電網路攻擊不對稱作戰IDF Unit 8200Information/computer/cyber attacksAsymmetric warfare
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:16
  • 點閱點閱:3
期刊論文
1.張祥山(20060400)。非傳統不對稱安全威脅初探。展望與探索,4(4),34-49。  延伸查詢new window
2.蔡昌言、李大中(20070700)。不對稱戰爭相關理論及其應用於中國對臺戰略之研析。遠景基金會季刊,8(3),1-42。new window  延伸查詢new window
3.簡華慶(20120100)。網路資訊戰所扮演角色及因應策略之研究。國防雜誌,27(1),122-138。new window  延伸查詢new window
4.李承禹(20071200)。中共網路作戰之戰略邏輯分析:網路戰與網路中心戰的區隔與應用。復興崗學報,90,245-264。new window  延伸查詢new window
5.吳嘉龍(20130900)。網路科技發展與資訊安全管理研究探討。危機管理學刊,10(2),79-86。new window  延伸查詢new window
6.謝游麟(20091000)。孫子「不對稱」思想對國軍軍事戰略之啟示。國防雜誌,24(5),80-95。new window  延伸查詢new window
7.李晧、張瑞麟(20120600)。「不對稱作戰」之發展探討。海軍學術雙月刊,46(3),35-51。  延伸查詢new window
8.曾于蓁(20201200)。網路安全對國家安全之重要性:以臺灣的網路安全為例。發展與前瞻學報,30,5-26。new window  延伸查詢new window
9.財團法人國防安全研究院(20211109)。網路作戰。國防情勢特刊,13,35-39。  延伸查詢new window
10.Adamsky, Dmitry (Dima)(2017)。The Israeli Odyssey toward its National Cyber Security Strategy。The Washington Quarterly,40(2),113-127。  new window
11.Eizenkot, Gadi(2018)。Cyberspace and the Israel Defense Forces。Cyber, Intelligence, and Security,2(3),99-104。  new window
12.Tabansky, Lior(2020)。Israel Defense Forces and National Cyber Defense。Connections,19(1),45-62。  new window
13.Sof, Eric(20220331)。Operation Orchard: Bombing of the Syrian Nuclear Reactor。Spec Ops Magazine。  new window
研究報告
1.Frei, Jasper(2020)。Israel's National Cybersecurity and Cyberdefense Posture。  new window
學位論文
1.曹潤生(2006)。冷戰後中共資訊戰之發展(碩士論文)。淡江大學。  延伸查詢new window
圖書
1.Alexander, John B.、楊連仲、謝豐安(2001)。使用非致命性武器的未來戰爭。臺北:國防部史政編譯局。  延伸查詢new window
2.中華民國110年國防報告書編纂委員會(2021)。中華民國110年國防報告書。國防部。  延伸查詢new window
3.Metz, Steven、謝凱蒂、楊紫函、蔣永方(1990)。廿一世紀的武裝衝突:資訊革命與後現代戰爭。國防部史政編譯局。  延伸查詢new window
4.Housen-Couriel, Deborah(2017)。National Cyber Security Organisation: Israel。NATO CCD COE。  new window
5.Cordey, Sean(2019)。The Israeli Unit 8200: An OSINT-based Study。Center for Security Studies。  new window
6.Saalbach, K.(2011)。Cyber war method and practice。  new window
其他
1.Lewis, James Andrew(20180926)。Cognitive Effect and State Conflict in Cyberspace,https://www.csis.org/analysis/cognitive-effect-and-state-conflict-cyberspace。  new window
2.朱雪玲,曾華鋒(20171017)。制腦作戰:未來戰爭競爭新模式,http://www.81.cn/jfjbmap/content/2017-10/17/node_12.htm。  延伸查詢new window
3.蕭介雲(20190919)。智慧國防靠AI 中科院啟動十年大計,https://www.new7.com.tw/SNewsView.aspx?Key=%E4%B8%AD%E5%B0%87&i=TXT20190912103315WIS&p=1。  new window
4.王臻明(20210304)。先發射再瞄準:改變傳統戰術的繞行式械彈系統,https://opinion.udn.com/opinion/story/120873/5291844。  延伸查詢new window
5.周峻佑(20220305)。資安週報:2022年3月1日至4日,https://www.ithome.com.tw/news/149711。  延伸查詢new window
6.紀永添(20180402)。紀永添專欄:臺灣如何建構未來的不對稱戰力,https://www.upmedia.mg/news_info.php?SerialNo=37799&Type=2。  延伸查詢new window
7.夏洛山(20210605)。以國神祕部隊曝光 AI首次介入戰爭,https://www.epochtimes.com/b5/21/6/5/n13001442.htm。  延伸查詢new window
8.江山52(20210227)。以色列網路武器的興起,https://iemiu.com/zh-tw/history/36282.html。  延伸查詢new window
9.(20121102)。Israel builds up its cyberwar corps,https://www.upi.com/Defense-News/2012/11/02/Israel-buildsup-its-cyberwar-corps/52421351881449/。  new window
10.Cohen, Avner(20170605)。The 1967 Six-Day War,https://www.wilsoncenter.org/publication/the-1967-six-day-war。  new window
11.Cordesman, Anthony H.(20100629)。The ArabIsraeli Military Balance in 2010,https://www.csis.org/analysis/arab-israeli-military-balance-2010。  new window
12.Dahm, Mike(2021)。The Reality of War Should Define Information Warfare,https://www.usni.org/magazines/proceedings/2021/march/reality-war-should-define-information-warfare。  new window
13.Erman, Sarah(20220427)。Trellix Finds Escalation of Cyberattacks Targeting Critical Infrastructure as Geopolitical Tensions Rise,https://www.trellix.com/en-us/about/newsroom/news/news-detail.html?news_id=2019cc26-3450-4b0d-b238-82d49348dcb7。  new window
14.Gabidullina, Roksana(20210312)。The Future of U.S.-Russian Arms Control: Principles of Engagement and New Approaches,https://www.csis.org/analysis/future-us-russian-arms-control-principles-engagement-and-new-approaches。  new window
15.Harrison, Todd(20210805)。Battle Networks and the Future Force,https://www.csis.org/analysis/battle-networks-and-future-force。  new window
16.Harding, Emily(20220615)。The Hidden War in Ukraine,https://www.csis.org/analysis/hidden-war-ukraine。  new window
17.Jones, Seth G.(20220218)。Russia's Losing Hand in Ukraine,https://www.csis.org/analysis/russias-losing-hand-ukraine。  new window
18.Lewis, James Andrew(20190625)。Iran and Cyber Power,https://www.csis.org/analysis/iran-and-cyber-power。  new window
19.Lewis, James Andrew(20200817)。Dismissing Cyber Catastrophe,https://www.csis.org/analysis/dismissing-cyber-catastrophe。  new window
20.Lewis, James Andrew(20110711)。Cyber Attacks, Real or Imagined, and Cyber War,https://www.csis.org/analysis/cyber-attacks-real-or-imagined-and-cyber-war。  new window
21.McNamara, Robert(20200221)。The Yom Kippur War of 1973,https://www.thoughtco.com/yom-kippur-war-4783593。  new window
22.Reed, John(20150710)。Unit 8200: Israel's cyber spy agency,https://www.ft.com/content/69f150da-25b8-11e5-bd83-71cb60e8f08c。  new window
23.Sheppard, Lindsey R.(20190913)。Fly-Fight-AI: Air Force Releases New AI Strategy,https://www.csis.org/analysis/fly-fight-ai-air-force-releases-new-ai-strategy。  new window
24.TeamT5 Media Center(20210701)。Another CloudDragon attack abusing VPN zero-day vulnerability to target South Korean entities,https://teamt5.org/en/posts/another-clouddragon-attack-abusing-vpn-zero-day-vulnerability-to-target-south-korean-entities/。  new window
圖書論文
1.黃惟喬(2004)。不對稱作戰對現代戰爭的影響。國防大學軍事學部論文集。國防大學。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top