Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Chris B. Simmons"'
Publikováno v:
Journal of Computer Networks and Communications, Vol 2014 (2014)
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been exp
Externí odkaz:
https://doaj.org/article/0c866f987aaa4beda32230075e0009c5
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 5, Iss 1, Pp 6-6 (2009)
Externí odkaz:
https://doaj.org/article/a91d5388764d48c68001702600fd80d9
Publikováno v:
Journal of Education for Business. 93:185-195
Today's students experience increased anxiety around school and have difficulty keeping track of course assignments. The authors conceptually develop and empirically test a model of the impact of a...
Publikováno v:
Decision Sciences Journal of Innovative Education. 10:547-574
A significant body of literature focuses on learning mediated by technology (eLearning). We conceptually develop and empirically test a model of trust antecedents with online undergraduate students. Contributing to the student eLearning success liter
Publikováno v:
The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent.
Cyber-attacks are increasing at an alarming rate and the attackers have progressively improved in devising attacks towards specific targets. To further develop the area of cyber-attack communication, we propose an ontology based issue resolution syst
Publikováno v:
Security and Privacy Protection in Information Processing Systems ISBN: 9783642392177
SEC
SEC
Game theory has been researched extensively in network security demonstrating an advantage of modeling the interactions between attackers and defenders. Game theoretic defense solutions have continuously evolved in most recent years. One of the press
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b6d91de8feb2362f35dddddc850ad299
https://doi.org/10.1007/978-3-642-39218-4_26
https://doi.org/10.1007/978-3-642-39218-4_26
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9783642287978
Ad-hoc security mechanisms are effective in solving the particular problems they are designed for, however, they generally fail to respond appropriately under dynamically changing real world scenarios. We discuss a novel holistic security approach wh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::387db18905e6e4c5f976b8fdb136165c
https://doi.org/10.1007/978-3-642-28798-5_63
https://doi.org/10.1007/978-3-642-28798-5_63
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 5, Iss 1, Pp 6-6 (2009)
In today's global economy, shrinking business cycles and global competetition are changing the landscape of software development. Frequently, multiple and geographically dispersed development teams are working together on large complex software syste