نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :IEEE Access 2023

Attackers compromise organizations with increasingly sophisticated ways, such as Advanced Persistent Threat (APT) attackers. Usually, attacks have the intention to exploit endpoints gain access critical data. For security controls and defense evaluation, may employ offensive activities. The most important one is penetration testing red teaming, but operations are usually resource exhaustive ext...

Journal: :Journal of Mathematics and Computer Science 2014

Journal: :Energy and AI 2021

Battery energy storage system (BESS) is an important component of a modern power since it allows seamless integration renewable sources (RES) into the grid. A BESS vulnerable to various cyber threats that may influence its proper operation, which in turn impacts negatively and electric The potential failure can cause economic issues physical damage components. To ensure cyber-secure reliable op...

2003
Michael Atighetchi Partha P. Pal Franklin Webber Christopher C. Jones

Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources, or abusing protocols. Defending against networkbased attacks is a major focus area in the APOD (Application That Participate in Their Own Defense) project, which set out to develop technologies that increase an appli...

Journal: :International Journal of Computers Communications & Control 2018

Journal: :ACM Transactions on Internet Technology 2021

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented power. However, with development of information technology, traditional defense system cannot deal unknown security problems volunte...

2012
Rui Zhuang Su Zhang Scott A. DeLoach Xinming Ou Anoop Singhal

Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network’s configuration can increase the difficulty for attackers and thus improve the resilience of the system under attack. In this paper we present a basic design schema of a movingtarget ne...

2015
Anthony D. Glosson

As the information economy expands, network security threats proliferate. Large-scale data breaches have become something of a fixture in today’s news cycle: Target, Sony, Home Depot, JPMorgan Chase—the list goes on. Some estimates place the global costs of cyber insecurity at more than $400 billion. The United States is at something of a crossroads on one particularly crucial security issue: a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید