نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
To view the full product, including the scope and methodology, click on the link above. Spam, phishing, and spyware pose security risks to federal information systems. Spam consumes significant resources and is used as a delivery mechanism for other types of cyberattacks; phishing can lead to identity theft, loss of sensitive information, and reduced trust and use of electronic government servi...
Critical Infrastructures (CIs), such as smart power grids, transport systems, and financial infrastructures, are more and more vulnerable to cyber threats, due to the adoption of commodity computing facilities. Despite the use of several monitoring tools, recent attacks have proven that current defensive mechanisms for CIs are not effective enough against most advanced threats. In this paper we...
Mobile sensing enables data collection from large numbers of participants in ways that previously were not possible. In particular, by affixing a sensory device to a mobile device, such as smartphone or vehicle, mobile sensing provides the opportunity to not only collect dynamic information from environments but also detect the environmental hazards. In this paper, we propose a mobile sensing w...
Using Image Processing Methods to Improve the Detection of Buried Explosive Threats in GPR Data
The new U.S. Army vision contends that heuristics are practical tools for achieving innovation. Overcoming complex terrain and adaptive hybrid threats in Syria, Iraq, and Afghanistan requires technological innovation. Supportability issues result from modifying deployed weapon systems with new technology for countering these types of threats. Collecting detailed data on deployed weapon systems ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید