نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
The purpose of this paper is to introduce a case for standardised comprehensive cyber resilience framework Critical Space Infrastructure (CSI). Based on structure systematic review and meta-analyses, outlines the needs risk-based framework. assets are fundamental components critical national infrastructure (CNI), whose destruction significantly impacts many lives. Moreover, today’s digitally co...
The Cyber World has become a most important part of our everyday lives. We spend an increasingly significant portion of our lives in it and use it to communicate with friends, acquaintances, loved ones, and business associates. We make use of our computers and Internet connectivity to look for and purchase all kinds of goods and services. We make airline and other travel reservations through th...
Cyber–physical distribution systems with renewable energy should have high resilience under extreme conditions. However, in a system deep cyber–physical coupling, the propagation of information risk impairs system. This paper proposes strategy to improve that considers cross-space risk. First, mechanism for interaction between cyber space and physical is analyzed, an model proposed. Second, sta...
Video segmentation and keyframe extraction are the basis of Content-based Video Retrieval (CBVR), in which keyframe selection is at the very core of CBVR. At shot level, key-frame extraction provides sufficient indexing and browsing of large video databases. In this paper, we proposed two improved approaches of key-frame extraction for video summarization. In our first synthesis method based on...
In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment lev...
Currently, security of the cyber space (computer networks and the Internet) is mostly based on detection and/or blocking of attacks by the use of Intrusion Detection and Prevention System (IDPS), according to (National Institute of Standards and Technology [NIST SP80094], 2010). However IDPS lacks in security as it is based on postmortem approaches threats and attacks are identified and/or bloc...
Background and Objectives: The use of virtual networks has become a natural modern behavior, but the traumatic forms of their use have also received much attention in the last two decades. This study aimed at modelling structural relations of cyber-aggression based on perceived stress with the mediating role of virtual networks dependency in students of Mohaghegh Ardabili University in 2019. M...
although electronic contract consists of offer and acceptance, its specific characteristics and the fact that parties to it state their intention in a virtual world i.e. cyber-space, and specially given consumer's need of enough protection in this environment, new rules have been included in laws concerning this kind of contract which seek to make sure that consumer has been well informed ...
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
In the last lecture, we have learned about the characteristic features of cyber-physical systems (CPS): they combine cyber capabilities (computation and/or communication) with physical capabilities (motion or other physical processes). Cars, aircraft, and robots are prime examples, because they move physically in space in a way that is determined by discrete computerized control algorithms. Des...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید