نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
The information and communication technology (ICT) is increasingly involved in the measurement, operation, control protection of cyber-physical power system (CPPS). As one most promising infrastructure projects, Starlink a satellite Internet constellation being constructed by SpaceX for providing global access, which can benefit network service supply communication-enabled equipment locations w...
چکیده رشد فزاینده تکنولوژی در حوزه اطلاعات و ارتباطات، تهدیدهایی نیز به دنبال داشته است که حمله سایبری نمونه بارز چنین تهدیدی محسوب میگردد. تبعات چنین حملاتی به حدی جدی است که بازیگران بین المللی به ویژه دولتها را جهت اتخاذ رویه های مناسب و مواضع سیاسی-حقوقی به تکاپو واداشته است. مهم ترین چالش فراروی این موضوع مسئله مفهوم شناسی و تعریف حمله سایبری و لزوم تبیین و تعیین دایره مفهومی این پدیده است...
In cyber attack monitoring systems, various types of visualizations, such as geographical visualization, temporal visualization, logical visualization, are being used. Each visualization has its own advantages and disadvantages. Since it is important to analyze the information from different viewpoints and to make a right decision in practical cyber attack monitoring, these visualization should...
Cyberspace has increasingly become a medium to express outrage, conduct protests, take revenge, spread opinions, and stir up issues. Many cyber attacks can be linked to current and historic events in the social, political, economic, and cultural (SPEC) dimensions of human conflicts in the physical world. These SPEC factors are often the root cause of many cyber attacks. Understanding the relati...
This research which is still at it’s initial stages will examine the potential impacts of cyber attacks on Russian society and will determine a framework for pattern recognition from Russian cyber space to identify the major clusters of people’s knowledge and skills in protecting themselves against cyber crime. The main aim of this research is to create the map of Russian society showing the mo...
Cyber attacks are frequently in the news, including the new phenomenon of cyber warfare. But how worried should we be? Whilst other investigations of this topic look at the means of attack, this paper explores the impact. Can cyber attacks really have a significant impact? This paper will be of interest to anyone who has an interest in the application of cyber power in international relations.a...
Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a cla...
Cyber criminals compromise Integrity, Availability and Confidentiality of network resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and probe/scan system attacks .To handle these intrusions, Cyber Security uses three audit and monitoring systems namely Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS). Intrusion Detection System (IDS) monitors ...
This document is an attempt to describe the landscape of cyber-security. It starts from a specific framing–why the technology associated with cyberspace is insecure. The central conclusion is that improving the security posture of the technology is not itself a simple technical problem, but requires an understanding of economic issues, incentives and externalities, coordination and leadership, ...
The field of cyber security is faced with ever-expanding amounts of data and a constant barrage of cyber attacks. Within this space, we have designed BubbleNet as a cyber security dashboard to help network analysts identify and summarize patterns within the data. This design study faced a range of interesting constraints from limited time with various expert users and working with users beyond ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید