نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

2017
Bruce McMillin Mo-Yuen Chow Jie Duan

1. Project Goals ● Develop a resilient cyber-physical control strategy for FREEDM system to secure the energy scheduling and physical operation: ○ Extending to cyber-physical security: Explore possible attacks on both energy scheduling and physical operation, analyze the impacts in terms of economic benefit and system stability. ○ Interaction between cyber/physical layer detection: Investigate ...

2015
N. J. Hwang

Permission has been given to destroy this document when it is no longer needed. Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow—motivating sweeping requirements and investments in cyber...

2012
Ravi Sharma

Cyber Security plays an important role in the development of information technology as well as Internet services. Our attention is usually drawn on “Cyber Security” when we hear about “Cyber Crimes”. Our first thought on “National Cyber Security” therefore starts on how good is our infrastructure for handling “Cyber Crimes” [1]. This paper focus on cyber security emerging trends while adopting ...

Journal: :Internet Mathematics 2015
Maochao Xu Gaofeng Da Shouhuai Xu

Studying models of cyber epidemics over arbitrary complex networks can deepen our understanding of cyber security from a whole-system perspective. In this paper, we initiate the investigation of cyber epidemic models that accommodate the dependences between the cyber attack events. Due to the notorious difficulty in dealing with such dependences, essentially all existing cyber epidemic models h...

Journal: :Aggressive behavior 2014
Christopher Barlett Sarah M Coyne

The current research used meta-analysis to determine whether (a) sex differences emerged in cyber-bullying frequency, (b) if age moderated any sex effect, and (c) if any additional moderators (e.g., publication year and status, country and continent of data collection) influenced the sex effect. Theoretically, if cyber-bullying is considered a form of traditional bullying and aggression, males ...

Journal: :IJCBPL 2013
Constantinos M. Kokkinos Nafsika Antoniadou Eleni Dalara Anastasia Koufogazou Angeliki Papatziki

The aim of this study was to investigate the association of personality (Five Factor Model), coping and cyber-bullying/victimization experiences among 300 Greek pre-adolescent students attending the upper two primary school grades. Boys reported more frequent involvement in cyber-bullying incidents, while there were no significant gender differences in terms of cyber-victimization. In terms of ...

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

2001
Tomoko Itao Tetsuya Nakamura Masato Matsuo Tatsuya Suda Tomonori Aoyama

In this paper, we describe Jack-in-the-Net (Ja-Net) architecture for service emergence and evolution in a large scale, open network environment. In Ja-Net, a service is implemented by a collection of cyber-entities and provided through cooperative interaction of cyber-entities. Cyber-entities interact with each other using Ja-Net ACL (Agent Communication Language). To ensure that service compos...

2015
Lidong Wang Cheryl Ann Alexander

Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber sec...

2011
Elfadil Sabeil Azizah Bt Abdul Manaf Zuraini Ismail Mohamed Abas

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید