نتایج جستجو برای: سایبرلوفینگ cyber loafing
تعداد نتایج: 16469 فیلتر نتایج به سال:
Cyberwarfare has become a fashionable topic in the last decade, partly because of the ever increasing sophistication of computer attacks, partly because of malicious actors setting their sight on industrial systems such as plants. Modern production systems are characterized by an IT-infrastructure controlling effects in the physical world. Such systems are called cyber-physical systems. In this...
Cyber safety has become critically important to all who are active in cyber space. In most African countries no coordinated activities in this regard are taking place, even though many children are already active on cyber space. This paper presents an introductory, but usable, guide to empower primary school teachers, specifically in Africa, to impart the basic principles of cyber safety to the...
The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...
Information and communication technology (ICT) systems underpin many of today’s societal functions and economic development. Consequently, protecting a nation’s ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. Collaboration among all parties across all domains of cyberspace is the key to effective and coordinated effort to cope with cybe...
As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I&C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for th...
An indispensable component of cyber security education is hands-on activities carried out in a lab to enable students to understand both offense and defense aspects of the cyber space. We describe our design and implementation of this course, and a resulting student organization Cyber Defense Club (CDC), at Kansas State University. Our 1.5-year experience in teaching this course and advising th...
SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...
Exploring the laws of the nature and the rules of human society is the grand challenge of sciences. The Internet, Web, various communication networks and digital devices are connecting each other to form an enormous cyber space. The cyber space gradually connects the natural physical space via various cyberphysical interfaces to form Cyber Physical Systems. Interacting with humans, Cyber Physic...
Cyber graphics as an emerging technology has been playing key roles as human interfaces of cyber worlds. With the ever increasing roles of cyber worlds in the real world, as seen in e-financial trading that deals GDP-equivalent in a day, understanding of cyber graphics is becoming essential. To this end, scientific research has been conducted to grasp the foundation as invariants. Cellular mode...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید