نتایج جستجو برای: cyber spaces
تعداد نتایج: 145945 فیلتر نتایج به سال:
Information and communication technology (ICT) systems underpin many of today’s societal functions and economic development. Consequently, protecting a nation’s ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. Collaboration among all parties across all domains of cyberspace is the key to effective and coordinated effort to cope with cybe...
As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I&C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for th...
An indispensable component of cyber security education is hands-on activities carried out in a lab to enable students to understand both offense and defense aspects of the cyber space. We describe our design and implementation of this course, and a resulting student organization Cyber Defense Club (CDC), at Kansas State University. Our 1.5-year experience in teaching this course and advising th...
SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...
Exploring the laws of the nature and the rules of human society is the grand challenge of sciences. The Internet, Web, various communication networks and digital devices are connecting each other to form an enormous cyber space. The cyber space gradually connects the natural physical space via various cyberphysical interfaces to form Cyber Physical Systems. Interacting with humans, Cyber Physic...
Cyber-criminals can distribute malware to control computers on a networked system and leverage these compromised computers to perform their malicious activities inside the network. Botnet-detection mechanisms, based on a detailed analysis of network traffic characteristics, provide a basis for defense against botnet attacks. We formulate the botnet defense problem as a zero-sum Stackelberg secu...
زیردیفرانسیل و آنالیز تقریبی روی فضاهای باناخ در این رساله با مطالعه ی دقیق مقاله proximal analysis in reflexive smooth banach spaces یک مخروط نرمال تقریبی در فضاهای باناخ بازتابی و هموار برحسب عملگر تصویر تعمیم یافته معرفی و مطالعه می کنیم. همچنین دو نوع جدید از زیر دیفرانسیل های تعمیم یافته در فضاهای باناخ بازتابی و هموار
Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...
Cyberbullying has become an ever-pressing topic for young people in a time of ubiquitous media. Some the existing, mostly quantitative studies reveal that (cyber-)bullying is gendered and female genderqueer are bullied more often differently than males. However, there lack qualitative look into specific reproduction dynamics discourses bullying stretches across entangled socio-material-technolo...
Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید