نتایج جستجو برای: cyber spaces

تعداد نتایج: 145945  

Journal: :International Journal of Distributed Sensor Networks 2012

2011
N. Sridhar D. Lalitha Bhaskari P. S. Avadhani

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forens...

2011
Yong-Dal Shin

In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...

2014

Background: The Cyber Preparedness Continuum CNA’s Safety and Security Division conducted a Cyber Preparedness Workshop on April 25, 2013, at CNA’s headquarters in Alexandria, Virginia. The workshop brought together emergency management and cybersecurity stakeholders, drawn from both the public and private sectors, to discuss cyber preparedness. Discussions during the workshop centered around t...

2015
Steven Noel Jackson Ludwig Prem Jain Dale Johnson Roshan K. Thomas Jenny McFarland Ben King Seth Webster Brady Tello

This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...

2015
Tarun Yadav Arvind Mallari Rao

Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on organizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder...

Journal: :CoRR 2014
G. Nikhita Reddy G. J. Ugander Reddy

Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cy...

2012
Hemraj Saini Yerra Shankar Rao

In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have some motivation behind it or may be processed unknowingly. The attacks those are processed knowingly c...

ژورنال: :تحقیقات حقوقی 0
فاطمه کیهانلو استادیار دانشکده حقوق و علوم سیاسی دانشگاه آزاد اسلامی واحد کرج وحید رضادوست دانشجوی کارشناسی ارشد حقوق بین الملل دانشگاه شهید بهشتی

یکی از مسائل چالش­برانگیز حقوق بین­الملل در ادوار مختلف، تنظیم روابط دولت­های متخاصم و شیوه­ حل و فصل اختلافات آنها با یکدیگر بوده است. در این میان، تا مدت های مدید، اصلی­ترین راه حل اختلاف، جنگ و توسل به زور بود؛ هرچند به مرور نهادینه کردن حقوقیِ این امرِ مذموم با هدف کاهش و سپس حذف آن، وجهه همت جامعه بین­المللی قرار گرفت. از زمانی که اسناد بین­المللی، جنگ و حمله­ نظامی را به طور مطلق ممنوع کردن...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید