نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

Journal: :Journal of school psychology 2012
Jing Wang Ronald J Iannotti Jeremy W Luk

Patterns of engagement in cyber bullying and four types of traditional bullying were examined using latent class analysis (LCA). Demographic differences and externalizing problems were evaluated across latent class membership. Data were obtained from the 2005-2006 Health Behavior in School-aged Survey and the analytic sample included 7,508 U.S. adolescents in grades 6 through 10. LCA models wer...

2017
Harald Vogt

The transformation of industrial assets into networked entities promises to increase the productivity of manufacturing processes significantly. It is a prerequisite for the close integration of these assets into production environments that increasingly rely on computerized planning, execution, and monitoring systems. The result of combining a (mechanical) asset with extensive computational cap...

2014
Thomas Hecht Lucie Langer Paul Smith

Smart grids will make extensive use of information and communication technology (ICT) to enable the integration of renewable energy sources. Consequently, future power grids come with a much larger cyber-attack surface, which makes cybersecurity risk assessment a major concern. Due to their cyber-physical nature, risk assessment in smart grids is a challenging task. Moreover, the complex mix of...

2012
Ranjan Pal

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, according to security experts, such software (an...

ژورنال: :تحقیقات حقوقی 0
جبار اصلانی دانشگاه تهران امیرحسین رنجبریان دانشگاه تهران

چکیده رشد فزاینده تکنولوژی در حوزه اطلاعات و ارتباطات، تهدیدهایی نیز به دنبال داشته است که حمله سایبری نمونه بارز چنین تهدیدی محسوب میگردد. تبعات چنین حملاتی به حدی جدی است که بازیگران بین المللی به ویژه دولتها را جهت اتخاذ رویه های مناسب و مواضع سیاسی-حقوقی به تکاپو واداشته است. مهم ترین چالش فراروی این موضوع مسئله مفهوم شناسی و تعریف حمله سایبری و لزوم تبیین و تعیین دایره مفهومی این پدیده است...

2017
Lehlogonolo Ledwaba Hein S. Venter

The ability to network machinery and devices that are otherwise isolated is highly attractive to industry. This has led to growth in the use of cyber-physical systems (CPSs) with existing infrastructure. However, coupling physical and cyber processes leaves CPSs vulnerable to security attacks. A threat-vulnerability based risk model is developed through a detailed analysis of CPS security attac...

Journal: :AEA Papers and Proceedings 2019

Journal: :Risks 2022

The COVID-19 pandemic and now the war in Ukraine, have raised risks to levels not seen last 30 years [...]

Journal: :International Journal of Advanced Computer Science and Applications 2021

Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond rising cyber threats (CT) in real-time. This paper aims study the impact threat intelligence on risk management Saudi universities mitigating risks. In this survey, a comprehensive review CTI concepts challenges, as well practices higher education, is presented. Previous literature was rev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید