نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
Requirements engineering has been mainly focused on software development, which represents relatively homogenous, stable and predictable cyber space. But even there, problems in requirements (e.g., changing, missing or irrelevant requirements) are considered as main reasons for project failure. Entering a new era of socio-cyber-physical systems, which are complex, heterogeneous systems of syste...
Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...
PURPOSE The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. METHODS The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures co...
This paper reports on a trade study we performed to support the development of a Cyber ontology from an initial malware ontology. The goals of the Cyber ontology effort are first described, followed by a discussion of the ontology development methodology used. The main body of the paper then follows, which is a description of the potential ontologies and standards that could be utilized to exte...
Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...
Cyber-physical systems (CPS) tightly integrate physical processes with cyber-control and monitoring. The difference between CPS and traditional embedded systems lies in the degree of integration of software systems with physical systems, the scale and complexity of the integrated systems, and the reliance on sensing, computation, and actuation via networks. New scientific foundations for specif...
Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...
Down the Cyber Rabbit Hole: Whistleblowing as a Means to Fulfilling Moral Obligations in Cyber Space
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید