نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

2010
Bruce H. Krogh David Garlan André Platzer Ken Butts Prashant Ramachandra

1. The Challenge: Heterogeneous Models Automotive systems and other cyber-physical systems are designed and analyzed using a variety of modeling formalisms and tools. Each representation highlights certain features and occludes others to make analysis tractable and to focus on particular performance attributes. Typically a particular formalism represents either the cyber or the physical element...

2015
Joseph Palmer Alvaro Pelayo

We present an algebraic method to study four-dimensional toric varieties by lifting matrix equations from the special linear group SL(2, Z) to its preimage in the universal cover of SL(2, R). With this method we recover the classification of two dimensional toric fans, and obtain a description of their semitoric analogue. As an application to symplectic geometry of Hamiltonian systems, we give ...

1999
Adérito Marcos Jürgen Bund Luís Grave Eduardo Tsen Rosa Ferreira

Realisation of exposition-like events, like conferences, exhibitions, etc., involves a multifaceted process regarding aspects such as: general planning, administration of the event’s ground, exhibitors and visitors support, local event’s time scheduling during de exposition or simple staff management. Depending on the complexity of the exposition, this usually requires considerable logistics ef...

2015
Jan Olaf Blech Peter Herrmann

Behavioral types for space-aware systems are proposed as a means to facilitate the development, commissioning, maintenance, and refactoring of systems with cyber-physical characteristics. In this paper, we particularly introduce the formal definition of behavioral types that are associated with system components in order to specify their expected behavior. As application domain, we concentrate ...

Journal: :CoRR 2015
Hai Zhuge

Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the followi...

Journal: :Inf. Soc. 2002
Adrian Mihalache

Various spatial metaphors related to cyberspace suffer from two major deŽ ciencies. First, they do not take into account that cyberspace is not a preexistent territory, but an entity that emerges in the process of its development. Second, cyberspace is not a metric space, so that most of the ready-made constructs, like the topologic spaces, cannot be of much use. An interpretation of Blake’s wo...

2015
Idan Morad Asaf Shabtai

the source, destination and nature of an attack. This can be done by enabling SSH tunneling to act as a proxy through which the malicious traffic is transmitted (e.g., leaking sensitive data, or command and control communications). As a case in point, the Flame virus detected in 2012 used SSL and SSH for stealing sensitive information and the Duqu virus detected in 2011 used SSH port forwarding...

Journal: :Enterprise IS 2011
Peggy E. Chaudhry Sohail S. Chaudhry Stephen A. Stumpf Hasshi Sudler

This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is ...

Journal: :IJCWT 2013
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید