نتایج جستجو برای: cyber spaces

تعداد نتایج: 145945  

2012
Florian Skopik Zhendong Ma Paul Smith Thomas Bleier

Information and communication technology (ICT) systems underpin many of today’s societal functions and economic development. Consequently, protecting a nation’s ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. Collaboration among all parties across all domains of cyberspace is the key to effective and coordinated effort to cope with cybe...

2008
Gee-Yong Park Cheol Kwon Lee Jong Gyun Choi Dong Hoon Kim Young Jun Lee Kee-Choon Kwon

As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I&C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for th...

2013
Alexandru G. Bardas Xinming Ou

An indispensable component of cyber security education is hands-on activities carried out in a lab to enable students to understand both offense and defense aspects of the cyber space. We describe our design and implementation of this course, and a resulting student organization Cyber Defense Club (CDC), at Kansas State University. Our 1.5-year experience in teaching this course and advising th...

2013
S. L. P. Yasakethu J. Jiang

SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...

Journal: :Concurrency and Computation: Practice and Experience 2011
Xiaoqing Shi Hai Zhuge

Exploring the laws of the nature and the rules of human society is the grand challenge of sciences. The Internet, Web, various communication networks and digital devices are connecting each other to form an enormous cyber space. The cyber space gradually connects the natural physical space via various cyberphysical interfaces to form Cyber Physical Systems. Interacting with humans, Cyber Physic...

2017
Thanh Nguyen Michael P. Wellman Satinder P. Singh

Cyber-criminals can distribute malware to control computers on a networked system and leverage these compromised computers to perform their malicious activities inside the network. Botnet-detection mechanisms, based on a detailed analysis of network traffic characteristics, provide a basis for defense against botnet attacks. We formulate the botnet defense problem as a zero-sum Stackelberg secu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان 1390

زیردیفرانسیل و آنالیز تقریبی روی فضاهای باناخ در این رساله با مطالعه ی دقیق مقاله proximal analysis in reflexive smooth banach spaces یک مخروط نرمال تقریبی در فضاهای باناخ بازتابی و هموار برحسب عملگر تصویر تعمیم یافته معرفی و مطالعه می کنیم. همچنین دو نوع جدید از زیر دیفرانسیل های تعمیم یافته در فضاهای باناخ بازتابی و هموار

2014
Preety T. Gunjal Sunil G. Tamhankar

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

Journal: :Gender Place and Culture 2022

Cyberbullying has become an ever-pressing topic for young people in a time of ubiquitous media. Some the existing, mostly quantitative studies reveal that (cyber-)bullying is gendered and female genderqueer are bullied more often differently than males. However, there lack qualitative look into specific reproduction dynamics discourses bullying stretches across entangled socio-material-technolo...

2013
Sridhar Neralla

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید