نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

2018
Ksenija Lace Marite Kirikova

Requirements engineering has been mainly focused on software development, which represents relatively homogenous, stable and predictable cyber space. But even there, problems in requirements (e.g., changing, missing or irrelevant requirements) are considered as main reasons for project failure. Entering a new era of socio-cyber-physical systems, which are complex, heterogeneous systems of syste...

Journal: :J. Cybersecurity 2015
Arunesh Sinha Thanh Hong Nguyen Debarun Kar Matthew Brown Milind Tambe Albert Xin Jiang

Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...

Journal: :Korean journal of medical education 2009
Ji-Soo Yoo Sook-Hee Ryue Jung Eun Lee Jeong-Ah Ahn

PURPOSE The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. METHODS The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures co...

2012
Leo Obrst Penny Chase Richard Markeloff

This paper reports on a trade study we performed to support the development of a Cyber ontology from an initial malware ontology. The goals of the Cyber ontology effort are first described, followed by a discussion of the ontology development methodology used. The main body of the paper then follows, which is a description of the potential ontologies and standards that could be utilized to exte...

2007
MAGINOT LINE Frederick Sheldon Axel Krings Seong-Moo Yoo Ali Mili Joseph Trien Mudhakar Srivatsa Ling Liu

Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...

2008
Jitender S. Deogun Steve Goddard

Cyber-physical systems (CPS) tightly integrate physical processes with cyber-control and monitoring. The difference between CPS and traditional embedded systems lies in the degree of integration of software systems with physical systems, the scale and complexity of the integrated systems, and the reliance on sensing, computation, and actuation via networks. New scientific foundations for specif...

Journal: :Transactions of the Institute of British Geographers 2005

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید