نتایج جستجو برای: espionage

تعداد نتایج: 371  

2016
Guanhua Yan Yunus Kucuk Max Slocum David C. Last

Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...

Journal: :Computer Standards & Interfaces 2003
Sean Lancaster David C. Yen Shi-Ming Huang

The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary transactions there will need to be a higher degree of confidence in the technology’s reliability and security. No one will agree to send his or her fina...

Journal: :CoRR 2012
Wajeb Gharibi Maha Shaabi

A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sourc...

2009
Sérgio Tenreiro de Magalhães Maria J. Rios Leonel Santos Hamid Jahankhani

The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military capability or even to create casualties. This p...

Journal: :JIP 2013
Ichita Higurashi Akira Kanaoka Masahiko Kato Eiji Okamoto

Gaining complete understanding of the active services and open communication paths is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, firstly we propose an automated appro...

2015

The progress of science in furnishing the Government with means of espionage is not likely to stop with wire tapping. Ways may some day be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring...

2012
Patrick Stewin Iurii Bystrov

Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have direct memory access (DMA) to the host runtime me...

2002
Antony Valentini

It is argued that immense physical resources – for nonlocal communication, espionage, and exponentially-fast computation – are hidden from us by quantum noise, and that this noise is not fundamental but merely a property of an equilibrium state in which the universe happens to be at the present time. It is suggested that ‘non-quantum’ or nonequilibrium matter might exist today in the form of re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید