نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
0
Switched systems are a convenient formalism for modeling physical processes interacting with a digital controller. Unfortunately, the formalism does not capture the distributed nature encountered e.g. in cyber-physical systems, which are organized as networks of elements interacting with local controllers. Most current methods for control synthesis can only produce a centralized controller, whi...
Most communications in the new era are dependent on Information and Communication Technology (ICT). In addition, infrastructure is becoming increasingly interconnected. This not only makes lives easier, but also leaves technology users more vulnerable. Cybercrime, digital espionage and other cyber disturbances dictate the news reports on a daily basis. In general, cyberattacks are no longer con...
An indispensable component of cyber security education is hands-on activities carried out in a lab to enable students to understand both offense and defense aspects of the cyber space. We describe our design and implementation of this course, and a resulting student organization Cyber Defense Club (CDC), at Kansas State University. Our 1.5-year experience in teaching this course and advising th...
Development of information technology and entrance to digital millennium confronted Copyright system with some serious challenges so that in some cases, protection of creators of digital works and protection of artistic and literary works in digital and cyber space and performance of this works in that space is in doubt. In order to removing this concerns and protection of copyright a...
This work establishes a cyber space of an urban area for visiting on the Internet. By registering entire scenes along every street and scenes at many locations, people can visually travel from street to street, and reach their destinations in cyber city. The issues we discuss here are how to map a large scale area to image domain in a small amount of data, how to cover visual information as com...
Humans consciously and subconsciously establish various links, emerge semantic images and reason in mind, learn linking effect and rules, select linked individuals to interact, and form closed loops through links while co-experiencing in multiple spaces in lifetime. Machines are limited in these abilities although various graph-based models have been used to link resources in the cyber space. T...
—It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of a...
The paper briefly describes cyber threats identification framework in a smart home test bed environment. A problem space is initially built, through a q-based survey of potential cyber threats sources. Further on, an expert based reference with morphological and system modelling and analysis of this space is performed via a specialized software environment – I-SCIP-MA-SA. The validation is orga...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید