نتایج جستجو برای: cyber spaces

تعداد نتایج: 145945  

2007
Myriam Dunn Cavelty

For some years, experts and government officials have warned of cyber-terrorism as a looming threat to national security. However, if we define cyber-terror as an attack or series of attacks that is carried out by terrorists, that instills fear by effects that are destructive or disruptive, and that has a political, religious, or ideological motivation, then none of the disruptive cyber-inciden...

2017
Riccardo Taormina Stefano Galelli Nils Ole Tippenhauer Elad Salomons Avi Ostfeld

This work contributes a modeling framework to characterize the effect of cyber-physical attacks (CPAs) on the hydraulic behavior of water distribution systems. The framework consists of an attack model and a MATLAB toolbox named epanetCPA. The former identifies the components of the cyber infrastructure (e.g., sensors or programmable logic controllers) that are potentially vulnerable to attacks...

2012
Alan Kim Brandon Wampler James Goppert Inseok Hwang Hal Aldridge

As the technological capabilities of automated systems have increased, the use of unmanned aerial vehicles (UAVs) for traditionally exhausting and dangerous manned missions has become more feasible. The United States Army, Air Force, and Navy have released plans for the increased use of UAVs, but have only recently shown interest in the cyber security aspect of UAVs. As a result, current autopi...

Journal: :J. Cybersecurity 2017
Henry Farrell Charles L. Glaser

The US approach to cybersecurity implicitly rests on an effects-based logic. That is, it presumes that the key question determining how the US and others will respond to attacks is what effects they have. Whether the effects come about as a result of cyber means or kinetic means is largely irrelevant. In this article, we explore this logic further, focusing on the question of when the US should...

2015
Kathryn B. Laskey Sudhanshu Chandekar Bernd-Peter Paris

Mapping IP addresses to physical locations is important for a host of cyber security applications. Examples include identifying the origin of cyber attacks, protecting against fraud in internet commerce, screening emails for phishing, and enforcing restrictions on commerce with sanctioned countries. Simultaneous geolocation of large numbers of IP hosts is needed for cyber situation awareness. E...

Journal: :CoRR 2017
Kyong Jae Park Sung Mi Park Joshua James

On October 2016 the South Korean cyber military unit was the victim of a successful cyber attack that allowed access to internal networks. Per usual with large scale attacks against South Korean entities, the hack was immediately attributed to North Korea. Also, per other large-scale cyber security incidents, the same types of ‘evidence’ were used for attribution purposes. Disclosed methods of ...

2017
Lucy R. Betts Karin A. Spenser Sarah E. Gardner

Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim. Despite cyber bullying typically occurring outside the school environment, the impact of being involved in cyber bullying is likely to spill over to school. Fully 285 11- to 15-year-olds (125 male and 160 female, M...

2014

The effectiveness and agility of an operation can be compromised through impact of adversary cyber activity on performance of key assets. The agility of adversary activity demands focused and effective investment in cyber security: there is a need for strong awareness of the military impact of threat vectors within the mission landscape, such that cyber security can be managed through a balance...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده علوم 1393

این پایان نامه در سه فصل نوشته شده است، در فصل اول تعاریف و قضایای لازم برای فصل های دوم و سوم بیان شده است. فصل دوم به بررسی عملگرهای ترکیبی وزن دار روی فضاهای توابع اندازه پذیر اختصاصداده شده است. فصل سوم که در واقع اصلی ترین فصل پایان نامه است به بیان نرم اساسی عملگر ترکیبی روی فضاهای ارلیز می پردازد. این پایان نامه بر اساس مقالات زیر تدوین گردیده است: • m. r. jabarzadeh the essential...

Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید