نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :Journal of organizational psychology 2021

We explore the reality of cyber risk faced by organizations, along with lack preparedness that continues to become apparent each successful cyber-attack. Sources project continued growth and evolution cyber-attacks; they will more frequent sophisticated. To prepare for mitigate these risks, we propose creating a cybersecurity-focused culture throughout all organizations. The greatest vulnerabil...

Journal: :Inf. Process. Lett. 2001
Jie Wu Li Sheng

A king u in a tournament is a player who beats any other player v directly or indirectly. That is, either u → v (u beats v) or there exists a third player w such that u→ w and w → v. A sorted sequence of kings in a tournament of n players is a sequence of players, S = (u1, u2, . . . , un), such that ui → ui+1 and ui in a king in sub-tournament Tui = {ui ,ui+1, . . . , un} for i = 1,2, . . . , n...

Journal: :JMIRx med 2022

Cyber defense is reactive and slow. On average, the time-to-remedy hundreds of times larger than time-to-compromise. In response to expanding ever-more-complex threat landscape, Digital Twins (DTs) particularly Human (HDTs) offer capability running massive simulations across multiple knowledge domains. Simulated results may insights into adversaries' behaviors tactics, resulting in better proac...

2014
Ranjan Pal

! Most of the defense, corporate, and civilian systems today are Internet-based. The trustworthiness of these Internet-based systems heavily depends on their security characteristics. It has been forecasted by national defense experts that the next big terrorist threat is a cyber-war, alongside this, the current Obama administration has also given much importance to strengthening cyber-security...

Journal: :CoRR 2011
Ranjan Pal Leana Golubchik Konstantinos Psounis

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimin...

2015
Malek Ben Salem Chris Wacek

Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data ...

Journal: :Lecture Notes in Computer Science 2021

Cyber operations are increasingly automated processes that can occur at computational speed with the intent of reducing, or denying time for good decision making to ground communication between human agents. There is a lack performance measures and metrics in cyber operation settings. One potential setting describing could be emotional stability under stress. Measures higher individual affectiv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید