Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Johan Sigholm"'
Autor:
Nicolò Boschetti, Chelsea Smethurst, Gregory Epiphaniou, Carsten Maple, Johan Sigholm, Gregory Falco
Publikováno v:
2023 IEEE Aerospace Conference.
Publikováno v:
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM).
Autor:
Gregory Falco, Wayne Henry, Marco Aliberti, Brandon Bailey, Mathieu Bailly, Sebastien Bonnart, Nicolò Boschetti, Mirko Bottarelli, Adam Byerly, Joseph Brule, Antonio Carlo, Giulia De Rossi, Gregory Epiphaniou, Matt Fetrow, Daniel Floreani, Nathaniel G. Gordon, Duncan Greaves, Bruce Jackson, Garfield Jones, Ronald Keen, Steven Larson, David Logsdon, Thomas Maillart, Kevin Pasay, Nebile Pelin Mantii, Carsten Maple, Damiano Marsili, Erin M. Miller, Johan Sigholm, Jill Slay, Chelsea Smethurst, Joseph D. Trujillo, Nick Tsamis, Arun Viswanathan, Christopher White, Ernest Wong, Matt Young, Mattias Wallen
Publikováno v:
ASCEND 2022.
Autor:
Johan Sigholm, Emil Larsson
Publikováno v:
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM).
Publikováno v:
HICSS
The people responsible for building the IT products and infrastructure of tomorrow – today’s students of the computing disciplines – oftentimes do not have the opportunity or proper motivation to develop cybersecurity skills meeting the needs o
Publikováno v:
Software & Systems Modeling. 17:695-711
Enterprise architecture (EA) has been established as a discipline to cope with the complex interactions of business operations and technology. Models, i.e., formal descriptions in terms of diagrams and views, are at the heart of the approach. Though
Autor:
Johan Sigholm, Emil Larsson
Publikováno v:
ICOIN
Hypertext Transfer Protocol Secure (HTTPS) is the de facto standard for secure end-to-end web communication. However, numerous flaws discovered during recent years, such as Apple's "goto fail" bug, and cryptographic weaknesses as illustrated by the P
Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation
Autor:
Johan Sigholm, Emil Larsson
Publikováno v:
2014 IEEE Military Communications Conference.
Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in
Autor:
Johan Sigholm, Martin Bang
Publikováno v:
EISIC
Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques an
Autor:
Johan Sigholm
The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e73fc489d8303fd00d6f6de4577528f1
http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3528
http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3528