منابع مشابه
Quantum Computing and Cybersecurity
As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography. Developing new standards for protecting data won’t be easy. The RSA standards that are in common use each took five years to develop. Ralph Merkle, a pioneer of publickey cryptography, points out that the technology of public-key systems, because it is less well-known,...
متن کاملLinking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...
متن کاملA Roadmap for Cybersecurity Research
Executive Summary The United States is at a significant decision point. We must continue to defend our current systems and networks and at the same time attempt to " get out in front " of our adversaries and ensure that future generations of technology will position us to better protect our critical infrastructures and respond to attacks from our adversaries. The term " system " is used broadly...
متن کاملSocial Cybersecurity
............................................................................................................................................... 2 ACKNOWLEDGEMENTS ........................................................................................................................ 3 CHAPTER 1: INTRODUCTION AND MOTIVATION ...........................................................................
متن کاملUCO: A Unified Cybersecurity Ontology
In this paper we describe the Unified Cybersecurity Ontology (UCO) that is intended to support information integration and cyber situational awareness in cybersecurity systems. The ontology incorporates and integrates heterogeneous data and knowledge schemas from different cybersecurity systems and most commonly used cybersecurity standards for information sharing and exchange. The UCO ontology...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy
سال: 2019
ISSN: 1540-7993,1558-4046
DOI: 10.1109/msec.2019.2916238