نتایج جستجو برای: سایبرلوفینگ cyber loafing
تعداد نتایج: 16469 فیلتر نتایج به سال:
In recent years there have been a number of international conflicts that have been mirrored by a parallel campaign of hostile actions in cyberspace. This, in turn, has prompted various attempts to analyze the phenomenon and explain the threat to the wider public. Unfortunately, however, the reports and analysis are often confusing and can include rather arbitrary use of various cyber “buzz word...
As the world marches deeper into the unknown passageway of digital revolution, it is becoming apparent that the tremendous benefits of the internet age are being challenged by the formidable menace of cyber-crime, not the least in the African region. While African States vary in the degree to which their economies and peoples are affected by cyber-crime, there is no gainsaying the fact that the...
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...
Cyber Physical System (CPS) is collection of different computation component which collaborate with each other in order to control the physical entity. Cyber physical system has a far reaching effect in different area such as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare, manufacturing, transportation, entertainment, and consumer appliances. CPS in healthca...
In the fi eld of cyber security, ill-defi ned concepts and inconsistently applied terminology are further complicating an already complex issue1. This causes diffi culties for policy-makers, strategists and academics. Using national cyber security strategies to support current literature, this paper undertakes three tasks with the goal of classifying and defi ning terms to begin the development...
Electric power grids have been identified as critical infrastructures. They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities. It can be envisioned that on top of the power infrastructure reside ICT layers that are coupled with the electric grids. As the ICT connectivity increases, so does the potential for cyber...
With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...
PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes
Nowadays, cyber crimes are increasing and have affected large organizations with highly sensitive information. Consequently, the affected organizations spent more resources analyzing the cyber crimes rather than detecting and preventing these crimes. Network forensics plays an important role in investigating cyber crimes; it helps organizations resolve cyber crimes as soon as possible without i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید