نتایج جستجو برای: cyber defense
تعداد نتایج: 91877 فیلتر نتایج به سال:
Attackers compromise organizations with increasingly sophisticated ways, such as Advanced Persistent Threat (APT) attackers. Usually, attacks have the intention to exploit endpoints gain access critical data. For security controls and defense evaluation, may employ offensive activities. The most important one is penetration testing red teaming, but operations are usually resource exhaustive ext...
Battery energy storage system (BESS) is an important component of a modern power since it allows seamless integration renewable sources (RES) into the grid. A BESS vulnerable to various cyber threats that may influence its proper operation, which in turn impacts negatively and electric The potential failure can cause economic issues physical damage components. To ensure cyber-secure reliable op...
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources, or abusing protocols. Defending against networkbased attacks is a major focus area in the APOD (Application That Participate in Their Own Defense) project, which set out to develop technologies that increase an appli...
Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented power. However, with development of information technology, traditional defense system cannot deal unknown security problems volunte...
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network’s configuration can increase the difficulty for attackers and thus improve the resilience of the system under attack. In this paper we present a basic design schema of a movingtarget ne...
As the information economy expands, network security threats proliferate. Large-scale data breaches have become something of a fixture in today’s news cycle: Target, Sony, Home Depot, JPMorgan Chase—the list goes on. Some estimates place the global costs of cyber insecurity at more than $400 billion. The United States is at something of a crossroads on one particularly crucial security issue: a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید