نتایج جستجو برای: cyber spaces

تعداد نتایج: 145945  

2001
Tomoko Itao Tetsuya Nakamura Masato Matsuo Tatsuya Suda Tomonori Aoyama

In this paper, we describe Jack-in-the-Net (Ja-Net), a framework to achieve adaptive service composition in a large scale, open network environment. In Ja-Net, a service is implemented by a collection of cyber-entities and provided through cooperative interaction of cyber-entities. Cyber-entities communicate with each other using Ja-Net ACL (Agent Communication Language) and establish relations...

2015
Priya Singh Neeraj Saini Rajkumar Saini

Cyber Crimes are increasing day by day and are posing a great threat to internet users. This paper discusses the Cyber crime, its nature and types. Various tools and techniques used for cyber crime are evaluated in this paper. The paper also discusses cyber related laws under Indian Penal Code and their application to the cyber offences. With the discussion of cyber crimes, this paper proposes ...

2018

'Space and place are central to the strategies and meaning of protest’ (p. xi) reads the opening sentence of Katrina Navickas's latest study, Protest and the Politics of Space and Place 1789–1848. Written, in part, as a response to the 'spatial turn' in History, Navickas makes a cogent and persuasive argument for attending to the importance of the particularities of 'place' rather than the abst...

Journal: :J. Sensor and Actuator Networks 2016
Dennis Pfisterer Mirjana Radonjic-Simic Julian Reichwald

Smart devices and cyber-physical systems, which are interconnected to IT systems and services, form the basis for the arising Internet of Everything, opening up new economic opportunities for its participants and users beyond its technological aspects and challenges. While today’s e-business scenarios are mostly dominated by a few centralized online platforms, future business models, which will...

Journal: :IJCWT 2013
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

Journal: : 2023

U.S National Security Strategy 2022 calls People Republic of China as the main enemy for decades. In United States' point view cyberspace is one key spaces confronting against China, where America preparing to deter its “aggression”. Washington blames Beijing in using cyber espionage and influence operation also having technical ability attacking American infrastructure, including crit...

2013
Martin R. Stytz Sheila B. Banks

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...

2015
Arniyati Ahmad Christopher Johnson Timothy Storer

Abstract—Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and Critical Information Infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates Organisation Cyber Resilience (OCR) of p...

Journal: :حقوق اسلامی 0
امیرحسین جلالی فراهانی کارشناس ارشد حقوق کیفری و جرم‎شناسی، پژوهشگر در حقوق کیفری سایبری

0

2011
P. Danquah

The Space Transition Theory (Jaishankar 2008) presupposes that people behave differently in the cyber world from the physical world amongst other postulates that seek to explain cyber criminal behavioural patterns. (Wall 2001) categorized cyber crime into the four main types of cyber trespass, cyber deception and theft, cyber pornography and cyber violence. This research sought test the postula...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید