نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :Entropy 2014
Bartosz Jasiul Marcin Szpyrka Joanna Sliwa

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threa...

2015
Keith D. Willett

The Department of Defense Strategy for Operating in Cyberspace (DSCOC) calls out the need for active cyber defense (ACD). The function of ACD is to provide sensing, sense-making, decision-making, and acting in cyber-relevant time in order to provide cyberspace defense before an adversary is able to bring about their desired effect. As automation increases and we move ever closer to automated cy...

2014
Panos Chatziadam Ioannis G. Askoxylakis Alexandros G. Fragkiadakis

Proactive cyber-security tools provide basic protection as today’s cyber-criminals utilize legitimate traffic to perform attacks and remain concealed quite often until it is too late. As critical resources, hidden behind layers of cyber-defenses, can still become compromised with potentially catastrophic consequences, it is of paramount significance to be able to identify cyber-attacks and prep...

2011
C. Cavanagh

Information security education remains a critical topic in today’s information driven societies. Educational institutions have been called to action to help raise information security awareness, knowledge and skills in those they serve. Cyber defense competitions are an attractive option to help raise awareness and interest in information security. Effective information security educational act...

2015
Karsten Martiny Alexander Motzek Ralf Möller

Abstract. Critical information infrastructures have been exposed to an increasing number of cyber attacks in recent years. Current protection approaches consider the reaction to a threat from an operational perspective, but leave out human aspects of an attacker. The problem is, no matter how good a defense planning from an operational perspective is, it must be considered that any action taken...

2016
Sandeep K. Shukla

Most critical infrastructures such as the power grid, railway or air traffic control, industrial automation in manufacturing, water/sewage infrastructure, banking system, etc., are cyber physical systems (CPS). Since continued availability of the major functions of these are extremely important for economic and normal lives of people, there is a wide spread concern that these might come under i...

Journal: :Proceedings of the ... Annual Hawaii International Conference on System Sciences 2021

2007
Anthony D. Joseph

Cyber-defense research has been severely limited by the lack of an experimental infrastructure for testing new theories and new technologies in realistic scenarios. Current testbeds are mostly smallscale and limited to small numbers of machines. The cyber DEfense Technology Experimental Research (DETER) testbed, provides a medium-scale test environment with more than 300 nodes. However, there i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید