Zobrazeno 1 - 10
of 113
pro vyhledávání: '"Casimer M. DeCusatis"'
Autor:
Steve Guendert, Casimer M. DeCusatis, William Paul Kluge, Wojciak Paul, John Houston, Robert M. Lynch
Publikováno v:
IEEE Transactions on Instrumentation and Measurement. 69:2172-2181
The IEEE 1588 standard known as Precision Time Protocol (PTP) was developed to provide highly accurate and synchronized clocks for a wide range of applications. In particular, it is critical for latency-sensitive applications, such as enterprise-clas
Publikováno v:
CCWC
The COVID-19 pandemic has given rise to a remote workforce and education system which is vulnerable to a number of unique cybersecurity risks. There is a need for training cybersecurity professionals to deal with cyber threats during the pandemic and
Autor:
Emily Mcgettrick, Casimer M. DeCusatis
Publikováno v:
CCWC
Although the fundamental principles of quantum computing have been known for decades, it is only within the past few years that practical quantum computers have become available. Since these systems are limited to a small number of qubits, they canno
Publikováno v:
Journal of Machine Intelligence and Data Science.
Publikováno v:
International Conference of Control, Dynamic Systems, and Robotics.
Publikováno v:
UEMCON
On the frontier of cybersecurity are a class of emergent security threats that learn to find vulnerabilities in machine learning systems. A supervised machine learning classifier learns a mapping from x to y where x is the input features and y is a v
Publikováno v:
Advances in Science, Technology and Engineering Systems, Vol 2, Iss 3, Pp 30-35 (2017)
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving
Autor:
Matthew Oakley, Steven P. LaFalce, Stephen Stone, Pablo Rivas, Casimer M. DeCusatis, Nicholas Blaskey, Alex Antaki
Publikováno v:
UEMCON
Cyberattacks have been on the increase as computing power and data storage have become more accessible. The use of recent advances in machine learning across different fields has increased the potential adoption of new algorithms in solving important
Publikováno v:
Advanced Sciences and Technologies for Security Applications ISBN: 9783030168360
The growing number and severity of cybersecurity threats, combined with a shortage of skilled security analysts, has led to an increased focus on cybersecurity research and education. In this article, we describe the design and implementation of an e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::088192641d059f799fc835bdc416e039
https://doi.org/10.1007/978-3-030-16837-7_13
https://doi.org/10.1007/978-3-030-16837-7_13
Autor:
Alan G. Labouseur, Tyler V. Rimaldi, Casimer M. DeCusatis, Daniel N. Gisolfi, Michael Gutierrez
Publikováno v:
2018 IEEE MIT Undergraduate Research Technology Conference (URTC).
A honeypot is a web application or other resource that is deceptively constructed to log actions of its users, most (but not all) of whom can be assumed to be malicious actors. A honeynet is a network of honeypots. Thanks to their inter-connectedness