نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

2004
Masao Usuki Kozo Sugiyama Kazushi Nishimoto Takashi Matsubara

The importance of face-to-face informal communication is well recognized. The ‘irori’ is a Japanese-traditional little sitting space or room with a fire burning which affords relaxation and intimacy among a family. We, adopting the ‘irori’ as a metaphor, have designed and developed a cyber-space called IRORI as an IT-based space that catalyzes face-to-face informal communication among members o...

2015
Arniyati Ahmad Christopher Johnson Timothy Storer

Abstract—Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and Critical Information Infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates Organisation Cyber Resilience (OCR) of p...

2011
Hamed Okhravi Joshua W. Haines

E cyber threats in a contested environment provide a challenge in protecting operations and critical assets. Traditional cyber protection mechanisms can prove ineffective when facing a motivated, well-resourced adversary. As a result, many mission critical systems remain vulnerable to advanced, targeted cyber attacks despite the significant amount of effort and resources used to secure them. Co...

Journal: :حقوق اسلامی 0
امیرحسین جلالی فراهانی کارشناس ارشد حقوق کیفری و جرم‎شناسی، پژوهشگر در حقوق کیفری سایبری

0

2011
N. Sridhar D. Lalitha Bhaskari P. S. Avadhani

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forens...

Abd Sarmadi, Narges , Mobini Moqaddas, Majid ,

As the pioneer of contemporary Islamic awakening, Islamic revolution of Iran has a mission to inform people of middle-east region about the opportunities and challenges of recent uprisings. On the other hand, it has yet another mission, called the exportation of the revolution by late Imam Khomeini, to inform people of the countries where Islamic awakening has not spread yet. The tool Islamic r...

2011
Yong-Dal Shin

In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...

2014

Background: The Cyber Preparedness Continuum CNA’s Safety and Security Division conducted a Cyber Preparedness Workshop on April 25, 2013, at CNA’s headquarters in Alexandria, Virginia. The workshop brought together emergency management and cybersecurity stakeholders, drawn from both the public and private sectors, to discuss cyber preparedness. Discussions during the workshop centered around t...

2015
Steven Noel Jackson Ludwig Prem Jain Dale Johnson Roshan K. Thomas Jenny McFarland Ben King Seth Webster Brady Tello

This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...

Purpose: The aim of the current research is to write possible scenarios for the future of Iran's public libraries. Regarding the position and application of public libraries, they are considered as a communicative medium. Methodology: The effort is to offer scenarios that deal with the multiplicity and unpredictability of the future. The Two-on-Two model was used for determination of scenarios...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید