نتایج جستجو برای: cyber bulling

تعداد نتایج: 16294  

Journal: :CoRR 2011
Ranjan Pal Leana Golubchik Konstantinos Psounis

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimin...

2015
Constantinos M. Kokkinos Nafsika Antoniadou Angelos Markos

a r t i c l e i n f o Keywords: cyber-bullying cyber-victimization university students personality profile psychological symptoms online aggression The present study investigated the psychological profile of 430 Greek university students who reported cyber-bullying/victimization experiences. Participants completed a self-report questionnaire, measuring cyber-bullying, cyber-victimization, Inter...

2011
tHe coSt

WitH tHe office of cyber Security AND iNformAtioN ASSurANce iN tHe cAbiNet office. tHe coSt of cyber crime.

2010
André Platzer

Cyber-physical systems integrate cyber elements with physical elements, thereby combining the computing and physics regimes. This integration has exciting prospects as a basis for advanced systems that solve big technical, societal, economical, and ecological challenges. When designing, understanding, and analyzing these cyber-physical systems, however, we also face big integrative challenges. ...

2008
Ria Hanewald

Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence has received little attention in the educational...

2016
Regner Sabillon Victor Cavaller Jeimy Cano

Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a...

2010
Rainer Böhme Galina Schwartz

We propose a comprehensive formal framework to classify all market models of cyber-insurance we are aware of. The framework features a common terminology and deals with the specific properties of cyber-risk in a unified way: interdependent security, correlated risk, and information asymmetries. A survey of existing models, tabulated according to our framework, reveals a discrepancy between info...

2015
Steven Meckl Gheorghe Tecuci Mihai Boicu Dorin Marcu

This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence, knowledge engineering, and machine learning. After introducing advanced persistent threats, it overviews a systematic APT detection framework and the corresponding APT detection models, the fo...

2017
Pedro Merino Laso David Brosset John Puentes

This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series ...

2017
MATTHIAS A. FAHRENWALDT

We develop a novel approach for pricing cyber insurance contracts. The considered cyber threats, such as viruses and worms, diffuse in a structured data network. The spread of the cyber infection is modeled by an interacting Markov chain. Conditional on the underlying infection, the occurrence and size of claims are described by a marked point process. We introduce and analyze a new polynomial ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید