Proceedings of the conference Behind the Digital Curtain

Proceedings of the conference Behind the Digital Curtain

[wonderplugin_pdf src="https://www.promoteukraine.org/dirwp-content/uploads/2019/07/BEHIND-THE-DIGITAL-CURTAIN.-CIVIL-SOCIETY-VS-STATE-SPONSORED-CYBER-ATTACKS.-Proceedings-of-the-conference.-Promote-Ukraine.pdf" width="100%" height="700px" style="border:0; background:#3E9CD4;"] [siteorigin_widget class="AMP_Widget_Text"][/siteorigin_widget]
A look inside the Russian Information War

A look inside the Russian Information War

Barandiy Marta "Behind the digital curtain: A look inside the Russian Information War against the West" - DOI 10.34054/bdc001 in:  Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels - 25/06/2019 - DOI 10.34054/bdc000 Download the […]
A Fast Empirical Method for Detecting Fake News

A Fast Empirical Method for Detecting Fake News

Monastyrskyi Liubomyr, Boyko Yaroslav, Sokolovskyi Bohdan, Sinkevych Oleh A Fast Empirical Method for Detecting Fake News on Propagandistic News Resources - DOI 10.34054/bdc009 in:  Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels […]
Extraction, integration and data processing in the SIEM «SPLUNK»

Extraction, integration and data processing in the SIEM «SPLUNK»

Petro Venherskyi, Roman Karpiuk Extraction, integration and data processing in the SIEM «SPLUNK» using «NESSUS» vulnerability scanner - DOI 10.34054/bdc002 in:  Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels - 25/06/2019 - DOI 10.34054/bdc000 […]
Autonomous Weapons, Cyberattacks, and AI

Autonomous Weapons, Cyberattacks, and AI

Kotsiuba Igor Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI. DOI 10.34054/bdc004 in: Conference proceeding "Behind the Digital Curtain. Civil Society vs. State Sponsored Cyber Attacks", Brussels - 25/06/2019 - DOI 10.34054/bdc000 Download the Publication here:   Igor Kotsiuba - […]
Modern Cyber Weaponry

Modern Cyber Weaponry

Modern Cyber Weaponry and the “Weaponization” of Ideas: How Elections are Transformed into Cyber Operations Authors: Marta Barandiy, Viktoria Shestoperova, Yuliya Shutyak Download Publication here: Modern Cyber Weaponry The history of Russian hacking. The Gerasimov doctrine and the […]
The Kremlin’s cyber contractors

The Kremlin’s cyber contractors

The Kremlin’s cyber contractors. What motives? What risks? The Kremlin’s cyber army has become a formidable threat around the globe, with cyberattacks targeting not only states but also private companies. The cyberspace is still pretty […]
Image of Ukraine in Europe

Image of Ukraine in Europe

With the entry into force of the visa-free regime with the EU, the NGO Promote Ukraine conducted a survey in which it interviewed Europeans from different European countries and compared the theses of Russian propaganda […]
First Ukrainian Grammar for Dutch Speakers

First Ukrainian Grammar for Dutch Speakers

Dutch speakers who wish to study Ukrainian now have access to excellent learning material. Belgian researcher Niels Smeets has written the First Ukrainian Grammar for Dutch speakers, a several hundred pages book which includes all […]