نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

Journal: :international journal of management and business research 2012
ismaila adeleke ade ibiwoye folake olowokudejo

this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...

2014
Deborah Bodeau John Brtis Richard Graubart Jonathan Salwen

The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. Abstract This white paper describes how resiliency techniques apply to an acknowledged system-of-systems (SoS). MITRE's cyber resiliency engineering framework is extended, to...

2017
Michelle Dowling Virginia Tech Lyndsey Franklin Mi Feng Meg Pirrung Robert Jasper Joseph Cottam Leslie Blaha

During knowledge elicitations with cyber analysts, we uncovered a need for tools that help analysts understand threat alerts in a context of baseline “normal” behaviors. We used an iterative design process to create a prototype alert management system with which we can explore the critical design space for effective baseline visualizations. We report herein on the design elements of this user i...

2014

The effectiveness and agility of an operation can be compromised through impact of adversary cyber activity on performance of key assets. The agility of adversary activity demands focused and effective investment in cyber security: there is a need for strong awareness of the military impact of threat vectors within the mission landscape, such that cyber security can be managed through a balance...

Journal: :IJSN 2014
Ghita Mezzour Kathleen M. Carley

Rumour diffusion has been widely studied in the literature. However, most prior work assumes that the rumour initiators are humans. This assumption does not hold in cyber space where some of the accounts are hacked. These hacked accounts aggressively disseminate rumours by continuously sending a large amount of messages. Our results show that when rumours are initiated by hacked accounts, the r...

2011
Vivek Menon Bharat Jayaraman Venu Govindaraju

Recognition, reasoning and retrieval are three fundamental operations in a cyber-physical space that is capable of identifying and tracking the movements of people and answering questions about their whereabouts. We show that a state transition system effectively abstracts the three R’s: events abstract recognition, transition function abstracts the reasoning, and states abstract the informatio...

Journal: :CoRR 2014
Claude Fachkha

Billions of users utilize the largest and more complex network of information, namely, the Internet. Despite the fact that this IT critical infrastructure provides various communication services, adversaries are abusing the Internet security and privacy to execute cyber attacks for various reasons. To cope with these threats, security operators utilize various security tools and techniques to m...

2001
Takahiro Nakai Makoto Tadenuma Shoji Tanaka Keiko Nakao

In order to make it possible for us to easily create a virtual world simply by using our imagination with building blocks and to take photographs of ourselves traveling in the wonder space with a beautiful composition, we have developed a system called “Cypher (Cyber Photographer in Wonder Space)”. With this system, users can blend the real world with a virtual world by using their aesthetic se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید