Results 91 to 100 of about 137,074 (286)

Cyberterrorism: suatu Tantangan Komunikasi Asimetris Bagi Ketahanan Nasional [PDF]

open access: yes, 2017
Cyberterrorism merupakan aktivitas dan/atau metode yang digunakan oleh sejumlah jaringan atau kelompok teroris. Tidak dapat dipungkiri bahwa dunia maya dan kemajuan teknologi mudah menjadi wadah bagi mereka dalam melakukan aksinya.
A.S, Aa Bambang, Fitriana, I. (Idealisa)
core  

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Using the Oldest Military Force for the Newest National Defense

open access: yesJournal of Strategic Security, 2015
The National Guard is establishing Cyber Mission Teams (CMT) that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions.
Brian Claus   +3 more
doaj   +1 more source

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
Проаналізовано заходи із забезпечення кібербезпеки провідних держав світу, виділені основні тенденції трансформації внутрішньої політики держав з огляду на активізацію кіберзагроз у світі. Запропоновано шляхи поліпшення кібербезпекової політики України з
Oleksandr M. Kosohov, Аnatoliy O. Siryk
doaj  

Cyber Threats Identification in the Evolving Digital Reality [PDF]

open access: yes, 2016
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2016Modern web technologies have already become an indispensable part of our everyday life, shaping a new, overlaid tech ...
Minchev, Zlatogor
core  

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]

open access: yes, 2012
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework

open access: yesIEEE Open Journal of the Computer Society
Automating cyber threat intelligence (CTI) collection and analysis in real time is critical for the timely detection and mitigation of cyber threats. Cybersecurity researchers have recently recommended CTI as a proactive and robust method for automated ...
Alemayehu Tilahun Haile   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy