نتایج جستجو برای: cyber defense
تعداد نتایج: 91877 فیلتر نتایج به سال:
We explore the reality of cyber risk faced by organizations, along with lack preparedness that continues to become apparent each successful cyber-attack. Sources project continued growth and evolution cyber-attacks; they will more frequent sophisticated. To prepare for mitigate these risks, we propose creating a cybersecurity-focused culture throughout all organizations. The greatest vulnerabil...
A king u in a tournament is a player who beats any other player v directly or indirectly. That is, either u → v (u beats v) or there exists a third player w such that u→ w and w → v. A sorted sequence of kings in a tournament of n players is a sequence of players, S = (u1, u2, . . . , un), such that ui → ui+1 and ui in a king in sub-tournament Tui = {ui ,ui+1, . . . , un} for i = 1,2, . . . , n...
Cyber defense is reactive and slow. On average, the time-to-remedy hundreds of times larger than time-to-compromise. In response to expanding ever-more-complex threat landscape, Digital Twins (DTs) particularly Human (HDTs) offer capability running massive simulations across multiple knowledge domains. Simulated results may insights into adversaries' behaviors tactics, resulting in better proac...
! Most of the defense, corporate, and civilian systems today are Internet-based. The trustworthiness of these Internet-based systems heavily depends on their security characteristics. It has been forecasted by national defense experts that the next big terrorist threat is a cyber-war, alongside this, the current Obama administration has also given much importance to strengthening cyber-security...
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimin...
Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data ...
Cyber operations are increasingly automated processes that can occur at computational speed with the intent of reducing, or denying time for good decision making to ground communication between human agents. There is a lack performance measures and metrics in cyber operation settings. One potential setting describing could be emotional stability under stress. Measures higher individual affectiv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید