نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

Journal: :Computer Communications 2015
Claude Fachkha Elias Bou-Harb Mourad Debbabi

This work proposes a novel approach to infer and characterize Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet, this work shows that we can extract DDoS activities without relying on backscattered analysis. The aim of this work ...

Journal: :Masaryk University Journal of Law and Technology 2016

2015
Tarun Yadav Arvind Mallari Rao

Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on organizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder...

Journal: :CoRR 2014
G. Nikhita Reddy G. J. Ugander Reddy

Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cy...

2012
Hemraj Saini Yerra Shankar Rao

In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have some motivation behind it or may be processed unknowingly. The attacks those are processed knowingly c...

ژورنال: :تحقیقات حقوقی 0
فاطمه کیهانلو استادیار دانشکده حقوق و علوم سیاسی دانشگاه آزاد اسلامی واحد کرج وحید رضادوست دانشجوی کارشناسی ارشد حقوق بین الملل دانشگاه شهید بهشتی

یکی از مسائل چالش­برانگیز حقوق بین­الملل در ادوار مختلف، تنظیم روابط دولت­های متخاصم و شیوه­ حل و فصل اختلافات آنها با یکدیگر بوده است. در این میان، تا مدت های مدید، اصلی­ترین راه حل اختلاف، جنگ و توسل به زور بود؛ هرچند به مرور نهادینه کردن حقوقیِ این امرِ مذموم با هدف کاهش و سپس حذف آن، وجهه همت جامعه بین­المللی قرار گرفت. از زمانی که اسناد بین­المللی، جنگ و حمله­ نظامی را به طور مطلق ممنوع کردن...

2011
Dino Schweitzer David Gibson David Bibighaus Jeff Boleng

Today’s students have grown up with computer-based technology and need to be prepared to enter a career in a digital world. This includes an understanding of the broader implications of technology such as the growing threat of cyber-crime and cyber-terrorism, cyber-ethics, the legal and social implications of technology, and the local and global impacts. At our institution, we have taken a broa...

2013
Amirudin Abdul Wahab

The cyber threat landscape has evolved in fairly dramatic ways. Cyber threats come in various different forms both technical and content related threats. Emerging threats have become sophisticated and a lot more disastrous involving state actors, state-sponsored actors, international organized criminals and Internet hacker activist groups. Today‘s cyber threats pose challenges to the Government...

Journal: :Computers in Human Behavior 2014
Christina F. Brown Michelle Kilpatrick Demaray Stephanie M. Secord

Cyber or electronic bullying is a growing problem among school-aged children and research on cyberbul-lying is still relatively young. The primary purposes of the current study were: (a) to investigate gender and grade level differences among cyber victims (b) to investigate the overlap between traditional victimization and cyber victimization and (c) to investigate the associations among cyber...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید