نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

2010
Peeter LORENTS

In recent years there have been a number of international conflicts that have been mirrored by a parallel campaign of hostile actions in cyberspace. This, in turn, has prompted various attempts to analyze the phenomenon and explain the threat to the wider public. Unfortunately, however, the reports and analysis are often confusing and can include rather arbitrary use of various cyber “buzz word...

Journal: :Journal of Information, Law and Technology 2009
Dejo Olowu

As the world marches deeper into the unknown passageway of digital revolution, it is becoming apparent that the tremendous benefits of the internet age are being challenged by the formidable menace of cyber-crime, not the least in the African region. While African States vary in the degree to which their economies and peoples are affected by cyber-crime, there is no gainsaying the fact that the...

Journal: :International Journal of Educational and Psychological Researches 2015

2016
Li Qiang Yang Ze - Ming Liu Bao - Xu Jiang Zheng - Wei

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...

2014
Shailesh Kumar Jha

Cyber Physical System (CPS) is collection of different computation component which collaborate with each other in order to control the physical entity. Cyber physical system has a far reaching effect in different area such as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare, manufacturing, transportation, entertainment, and consumer appliances. CPS in healthca...

2014
Robert S. Dewar

In the fi eld of cyber security, ill-defi ned concepts and inconsistently applied terminology are further complicating an already complex issue1. This causes diffi culties for policy-makers, strategists and academics. Using national cyber security strategies to support current literature, this paper undertakes three tasks with the goal of classifying and defi ning terms to begin the development...

2014
Alexandru Stefanov Chen-Ching Liu

Electric power grids have been identified as critical infrastructures. They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities. It can be envisioned that on top of the power infrastructure reside ICT layers that are coupled with the electric grids. As the ICT connectivity increases, so does the potential for cyber...

2015
Sven Herpig

With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...

2010
Mohammad Rasmi

Nowadays, cyber crimes are increasing and have affected large organizations with highly sensitive information. Consequently, the affected organizations spent more resources analyzing the cyber crimes rather than detecting and preventing these crimes. Network forensics plays an important role in investigating cyber crimes; it helps organizations resolve cyber crimes as soon as possible without i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید