نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :CoRR 2016
Craig Jackson Robert Templeman

Cyber has changed the scope of the Navy’s mission and is placing new strains on our diplomatic, warfighting, legal, and economic/budgetary processes. Cybersecurity processes and techniques are increasingly critical to our warfighting missions, but they can also inhibit the pace and potential for high impact, game-changing innovation. Throughout its history, the Navy has shown the ability of inn...

2003
Eija Koskivaara Barbro Back

As large-scale Cyber attacks become more sophisticated, local network defenders should employ strength-in-numbers to achieve mission success. Group collaboration reduces individual efforts to analyze and assess network traffic. Network defenders must evolve from an isolated defense in sector policy and move toward a collaborative strength-in-numbers defense policy that rethinks traditional netw...

2013
Bharat B. Madan Yan Lu

Data driven decisions derived from big data have assumed critical importance in many application domains, fueling the demand for collection, transportation, storage and processing of massive volumes of data at fast speeds. Such applications have made data a valuable resource that needs to be provided appropriate security. High value associated with big data sets has rendered the entire cyber in...

Journal: :IEICE Transactions on Information and Systems 2016

2010
Partha Pal Rick Schantz Michael Atighetchi Kurt Rohloff Nathan Dautenhahn William Sanders

This paper presents an overview of the current state of cyber-security research and development (R&D), and a number of forward looking thoughts focusing on the challenges the community is likely to encounter in the next few years. The research ideas are organized in two categoriesthe first describes ideas that have already taken roots in the R&D community, whereas the second describes ideas tha...

Journal: :Information 2015
Gaute Wangen

The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...

Journal: :Pancasila and Law Review 2022

State sovereignty is born together with the independence of a country, as well in cyberspace. The state has cyberspace its territorial space so that it jurisdictional authority, but reality, there are unclear boundaries Indonesia today still dependence on foreign cyberinfrastructure, which causes high level cyber vulnerability and low resilience. local wisdom known "Gotong Royong," this concept...

Journal: :CoRR 2016
Lakshmanan Nataraj B. S. Manjunath

CYBER attacks have risen in recent times. The attack on Sony Pictures by hackers, allegedly from North Korea, has caught worldwide attention. The President of the United States of America issued a statement and “vowed a US response after North Korea’s alleged cyber-attack”.This dangerous malware termed “wiper” could overwrite data and stop important execution processes. An analysis by the FBI s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید