نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
This article is devoted to an analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions. Adopting the framework of securitization theory, the article theorizes cyber security as a distinct sector with a particular constellation of threats and referent objects. It is held that ‘‘networ...
Crime has typically converged with aspects of warfare. This symbiotic relationship further complicates the broad battle-space understanding for early warning vigilance or defensive and offensive maneuvers against nebulous networks and masked relationships of convenience or ideology. The asymmetric cyber domain platform as an adversary’s tool to combat a foe unconventionally in a criminal, haras...
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce, education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and ...
The large deployment of Information and Communication Technology (ICT) exposes the power grid to a large number of coordinated cyber-attacks. Thus, it is necessary to design new security policies that allow an efficient and reliable operation in such conflicted cyber-space. The detection of cyberattacks is known to be a challenging problem, however, through the coordinated effort of defense-in-...
The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches. In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques. Jump processes are applied to model different and complex situations in cyber games. Applying jump processes we propose some m...
Current air traffic management systems suffer from poor radar coverage and a highly centralized architecture which can under heavy traffic loads overwhelm Air Traffic Control (ATC) centers. Such limitations can lead to inefficient use of the available airspace capacity and insecure scenarios such as low-visibility landings. Future air transportation systems with e-enabled aircraft and networked...
The cyber class has many advantages because it removes the limitations of sharing the same time and space of a class in a classroom. However, most instructors still hesitate to use it because it is more vulnerable to academic misconduct than a faceto-face class. To overcome this problem, we identified suspected cheaters out of a group of test-takers through several objective data, and verified ...
This paper discusses the emergence of innovative technologies related to cyber tools and IT frameworks which hold the potential to impact engineering education substantially. These technologies include next generation Internet frameworks based on Cloud Technologies as well as 3D Virtual Prototyping and Haptic technologies. These cyber tools will enable sharing of sparse or less accessible resou...
New techniques, tactics, and procedures (TTPs) are now available to strengthen security postures and become more resilient to cyber threats. Most of these technologies are accessible and affordable, and they are showing promising results. This paper exemplifies eight specific advanced techniques, tactics, and procedures to counter cyber threats, including using moving target architectures to co...
With a major change in the attack landscape, away from well known attack vectors towards unique and highly tailored attacks, limitations of common ruleand signature-based security systems become more and more obvious. Novel security mechanisms can provide the means to extend existing solutions in order to provide a more sophisticated security approach. As critical infrastructures get increasing...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید