نتایج جستجو برای: cyber spaces
تعداد نتایج: 145945 فیلتر نتایج به سال:
Pennsylvania is at the forefront of the public cyber charter schooling movement in America. As more and more students elect to transfer from traditional public schools into cyber charter schools–and their districts of origin are forced to forfeit their tuition allocations–a need for a public school alternative to cyber charter schools has emerged. Using current practices in Pennsylvania’s publi...
—It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of a...
Cyber situational awareness is attracting much attention. It features prominently in the national cyber strategies of many countries, and there is a considerable body of research dealing with it. However, until now, there has been no systematic and up-to-date review of the scientific literature on cyber situational awareness. This article presents a review of cyber situational awareness, based ...
This chapter uses a traditional framework called the D&D methods matrix as a foundation for describing the basics of D&D in the physical world, extends the D&D matrix to cyber security, and then outlines a set of techniques for applying D&D in the cyber security context. These descriptions can be combined with the cyber-D&D TTP taxonomy in Appendix A to guide understanding of how D&D is used in...
This paper describes a framework for modeling the security of a cyber–physical system in which the behavior of the adversary is controlled by a threat model that captures – in a unified manner – the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber–physical system. In particular, the framework addresses combined (dependent) vector attacks and sy...
we investigate compact composition operators on ceratin lipschitzspaces of analytic functions on the closed unit disc of the plane.our approach also leads to some results about compositionoperators on zygmund type spaces.
Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general socialising. Increased bandwidth and proliferation of mobile phones with access to Internet in South Africa imply increased access to Internet by the Sout...
Cyber security was one of four top priorities for UK national security in the 2010 National Security Strategy. Effective approaches to cyber security integrate technological measures with those relating to processes and personnel. There is no overarching regulation of cyber security in the UK, although a growing number of organisations are complying with voluntary standards. Better comm...
This paper deals with at least four major cyber safety concerns in Africa discussed in recent literature. These cyber concerns include aspects such as policies, procedure, awareness, research and the provision of technical security measures. Each concern is examined, the main focus areas are highlighted and a solution is proposed. This paper concludes by combining all relevant solutions into a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید