Results 241 to 250 of about 280,474 (284)
Some of the next articles are maybe not open access.
Network Security, 2021
I have gained inspiration from the Human Factors in Diving community to start an 'A-Z of cyber security’.1 Last time, we did M-P; in this column, I'm wrapping up the series with the remaining letters, with appropriate topics. Q & X - Questions & the uneXpected: In cyber security, and in the era of generational AI, we should always question our ...
openaire +2 more sources
I have gained inspiration from the Human Factors in Diving community to start an 'A-Z of cyber security’.1 Last time, we did M-P; in this column, I'm wrapping up the series with the remaining letters, with appropriate topics. Q & X - Questions & the uneXpected: In cyber security, and in the era of generational AI, we should always question our ...
openaire +2 more sources
Anticipation in Cyber-security
2017Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may range from threatening the foundation of modern information society, to causing catastrophic failure of nation-wide critical infrastructure. As a result, a great deal of effort has been given to mitigating the risks stemming from cyber-attacks and has ...
Ahrend, JM, Jirotka, M
openaire +1 more source
e-Government and Cyber Security: The Role of Cyber Security Exercises
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce solutions. The span of control of e-government and its impact across a community defines a system that is more than a sum of just single systems.
Art Conklin, Gregory B. White
openaire +1 more source
Cyber security training a survey of serious games in cyber security
2017 IEEE Frontiers in Education Conference (FIE), 2017Within the field of computer and information security, there has been a relatively recent surge of interest on a multitude of topics, ranging from secure programming practices, protocols and algorithm design to cryptography and ethics. However, this body of research typically focuses on the implementation or theory of security controls and mechanisms ...
Jin-Ning Tioh +2 more
openaire +1 more source
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
Like other parts of the economy, the electric power infrastructure is increasingly dependent on accurate and timely exchange of information for operations and markets. Vulnerabilities in the cyber infrastructure that supports this information exchange create risks for the reliability, efficiency and integrity of the power system.
openaire +1 more source
Like other parts of the economy, the electric power infrastructure is increasingly dependent on accurate and timely exchange of information for operations and markets. Vulnerabilities in the cyber infrastructure that supports this information exchange create risks for the reliability, efficiency and integrity of the power system.
openaire +1 more source
2018
Social Cyber-Security is an emerging scientific discipline. Its methodological and scientific foundation, key challenges, and scientific direction are described. The multi-disciplinary nature of this field and its emphasis on dynamic information strategies is considered.
Kathleen M. Carley +3 more
openaire +1 more source
Social Cyber-Security is an emerging scientific discipline. Its methodological and scientific foundation, key challenges, and scientific direction are described. The multi-disciplinary nature of this field and its emphasis on dynamic information strategies is considered.
Kathleen M. Carley +3 more
openaire +1 more source
Proceedings of the 2014 on International symposium on physical design, 2014
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire +1 more source
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire +1 more source
Proceedings of the 4th international conference on Security of information and networks, 2011
It is clear that the Internet is transforming the way we live and the recent decades have witnessed dramatic developments in information and communication technologies (ICT). Along with the phenomenal growth in technology enabled information economy has been a growth in computing technology related crimes.
openaire +1 more source
It is clear that the Internet is transforming the way we live and the recent decades have witnessed dramatic developments in information and communication technologies (ICT). Along with the phenomenal growth in technology enabled information economy has been a growth in computing technology related crimes.
openaire +1 more source
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
International Journal of Cyber Warfare and Terrorism, 2013Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them.
openaire +1 more source
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments
2012This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those with a profound interest in security.
Teodor Sommestad, Jonas Hallberg
openaire +1 more source

