نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

2011
Richard A. Martino

The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, requires the tools to synchronize effects from the cyber domain with those of the traditional land, maritime, space, and air domains. Cyberspace can compliment a commander’s theater strategy supporting strategic, operational, and tactical objectives. To be effective, or provide an effect, commanders must...

2015
Constantinos M. Kokkinos Nafsika Antoniadou Angelos Markos

a r t i c l e i n f o Keywords: cyber-bullying cyber-victimization university students personality profile psychological symptoms online aggression The present study investigated the psychological profile of 430 Greek university students who reported cyber-bullying/victimization experiences. Participants completed a self-report questionnaire, measuring cyber-bullying, cyber-victimization, Inter...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...

Journal: :Risk Management 2022

Abstract We use the world’s largest publicly available dataset of operational risk to model cyber losses and show that Tweedie best fits loss severity in financial industry. Three key determinants are firm size, contagion legal liability. also measure size based on estimation results a large degree heterogeneity across firms. The particularly relevant with respect recent discussion simplifying ...

Journal: :Syntax Idea 2021

The purpose of this paper is to analyze and describe the strategy Indonesian government in mitigating risk dealing threat cyber warfare. This uses qualitative method using 3 indicators mitigation theory consisting prevention, indentification remedy interpret problem explain it more detail by collecting data from literature studies. Cyber defense refers policies processes put place an institutio...

Journal: :Information 2021

Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks increase the level of security, safety and trustworthiness, prevent failure developments, minimize losses. It necessary analyze CPS configuration an automatic mode detect most vulnerable components reconfigure or replace them promptly. In this paper, we pres...

Journal: :Computers & Electrical Engineering 2015
Stefano Marrone Ricardo J. Rodríguez Roberto Nardone Francesco Flammini Valeria Vittorini

The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential aspects and interrelations among physical and cyber components. Like the systems themselves, security threats feature both cyber and physical elements. Although to apply divide et impera approaches helps handling system complexity, to consider just one aspect at a time does not provide adequate ri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید