نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
1. The Challenge: Heterogeneous Models Automotive systems and other cyber-physical systems are designed and analyzed using a variety of modeling formalisms and tools. Each representation highlights certain features and occludes others to make analysis tractable and to focus on particular performance attributes. Typically a particular formalism represents either the cyber or the physical element...
We present an algebraic method to study four-dimensional toric varieties by lifting matrix equations from the special linear group SL(2, Z) to its preimage in the universal cover of SL(2, R). With this method we recover the classification of two dimensional toric fans, and obtain a description of their semitoric analogue. As an application to symplectic geometry of Hamiltonian systems, we give ...
Realisation of exposition-like events, like conferences, exhibitions, etc., involves a multifaceted process regarding aspects such as: general planning, administration of the event’s ground, exhibitors and visitors support, local event’s time scheduling during de exposition or simple staff management. Depending on the complexity of the exposition, this usually requires considerable logistics ef...
Behavioral types for space-aware systems are proposed as a means to facilitate the development, commissioning, maintenance, and refactoring of systems with cyber-physical characteristics. In this paper, we particularly introduce the formal definition of behavioral types that are associated with system components in order to specify their expected behavior. As application domain, we concentrate ...
Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the followi...
Various spatial metaphors related to cyberspace suffer from two major de ciencies. First, they do not take into account that cyberspace is not a preexistent territory, but an entity that emerges in the process of its development. Second, cyberspace is not a metric space, so that most of the ready-made constructs, like the topologic spaces, cannot be of much use. An interpretation of Blake’s wo...
the source, destination and nature of an attack. This can be done by enabling SSH tunneling to act as a proxy through which the malicious traffic is transmitted (e.g., leaking sensitive data, or command and control communications). As a case in point, the Flame virus detected in 2012 used SSL and SSH for stealing sensitive information and the Duqu virus detected in 2011 used SSH port forwarding...
This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is ...
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید