نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :CoRR 2017
Avi Pfeffer Brian E. Ruttenberg Lee Kellogg Michael Howard Catherine Call Alison O'Connor Glenn Takata Scott Neal Reilly Terry Patten Jason Taylor Robert Hall Arun Lakhotia Craig Miles Daniel Scofield Jared Frank

Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber– defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber–attacks, and malware–based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future characteris...

2014
Elly van den Heuvel Gerben Klein Baltink

Effective Computer Network Defense requires close cooperation and collaboration between government and industry, science and education, national and international efforts. The Netherlands offers a concrete example of a successful public-private partnership aimed at improving overall cyber security for its society in general, including government, industry, and citizens. This requires more that ...

2018
Ricardo G Lugo Kirsi Helkala Benjamin J Knox Øyvind Jøsok Natalie M Lande Stefan Sütterlin

Background Technical advancement in military cyber defense poses increased cognitive demands on cyber officers. In the cyber domain, the influence of emotion on decision-making is rarely investigated. The purpose of this study was to assess psychophysiological correlation with perseverative cognitions during emotionally intensive/stressful situations in cyber military personnel. In line with pa...

2010
Mohammad A. Faysel Syed S. Haque

Cyber attack is one of the most rapidly growing threats to the world of cutting edge information technology. As new tools and techniques are emerging everyday to make information accessible over the Internet, so is their vulnerabilities. Cyber defense is inevitable in order to ensure reliable and secure communication and transmission of information. Intrusion Detection System (IDS) and Intrusio...

2011
Hannes Holm Teodor Sommestad Ulrik Franke Mathias Ekstedt

This paper describes a study on how cyber security experts assess the importance of three variables related to the probability of successful remote code execution attacks – presence of: (i) non-executable memory, (ii) access and (iii) exploits for High or Medium vulnerabilities as defined by the Common Vulnerability Scoring System. The rest of the relevant variables were fixed by the environmen...

2014
Ping Wang Jia-Chi Liu

Defenders have developed various threat risk analysis schemes to recognize the intruder attack profile, identify the system weakness, and implement the security safeguards to protect the information asset from cyber-attacks. Attack trees (AT) technique play an important role to investigate the threat analysis problem to known cyber-attacks for risk assessment. For example, protection trees and ...

Journal: :CoRR 2015
Selma Dilek Hüseyin Çakir Mustafa Aydin

With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures; hence, there is a need for more sophisticated cyber defense systems that need to be flexible...

Journal: :The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 2017

Journal: :Cybersecurity: Education, Science, Technique 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید