Justifying Cyber-intelligence?
نویسندگان
چکیده
منابع مشابه
Cyber-awareness Improvement Using Artificial Intelligence Techniques
The primary contribution of this experiment is the development of a framework on which a variety of multitasking processes can be mapped. A software model named SHOWAN is developed to represent, capture and learn the cyber awareness behavior of a computer process against multiple concurrent threads. At the beginning of the experiment, the examined process outperformed, and tended to manage nume...
متن کاملRole of Intelligence Inputs in Defending against Cyber Warfare and Cyber Terrorism
This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...
متن کاملSpecial Track on Artificial Intelligence and Cyber Security
Cyber security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence approaches...
متن کاملData-driven analytics for cyber-threat intelligence and information sharing
particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...
متن کاملCyber Threat Intelligence for Supporting the ATM Security Management
This paper presents the recent research advances in ATM (Air Traffic Management) industry showcasing the solution envisaged for the GAMMA Project and demonstrating how the cyber threat intelligence is used to support ATM security management.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Military Ethics
سال: 2016
ISSN: 1502-7570,1502-7589
DOI: 10.1080/15027570.2017.1284463