Zobrazeno 1 - 10
of 11
pro vyhledávání: '"John San Miguel"'
Autor:
Scott M. Slayback, Jose Romero-Mariona, Esperanza Romero, Francisco Tacliad, John San Miguel, Maxine Major, Richard Phipps, Roger A. Hallman
Publikováno v:
International Journal of Organizational and Collective Intelligence. 11:91-112
Much of modern life is dependent on networked critical infrastructure systems—many known to be susceptible to cyberattacks—such as the electrical grid, water purification, and transportation systems. The consequences of a successful cyberattack o
Publikováno v:
Radiotherapy and Oncology. 174:S41
Autor:
Roger A. Hallman, Jose Romero-Mariona, Richard Phipps, John San Miguel, Esperanza Romero, Maxine Major
Publikováno v:
COMPLEXIS
Autor:
Megan Kline, Scott M. Slayback, Stefanie S. F. Chang, John San Miguel, Alexis Rogers, Roger A. Hallman
Publikováno v:
CCS
Malware mitigation for mobile technology is a long-standing problem for which there is not yet a good solution. In this paper, we focus on identifying malicious applications, and verifying the absence of malicious or vulnerable code in applications t
Publikováno v:
IoTBDS
Autor:
Lawrence Kerr, Josiah Bryan, Megan Kline, Geancarlo Palavicini, Jose Romero-Mariona, Roger A. Hallman, John San Miguel, Maxine Major, Jorge Alvarez
Publikováno v:
Enterprise Security ISBN: 9783319543796
ES
ES
Large organizations must plan for Cybersecurity throughout their entire network, taking into account network granularity and outside subcontractors. The United States Department of Defense (DoD) has large networked systems that span the globe, crossi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::954b7414f7c6c1942b5859d8b14b44e4
https://doi.org/10.1007/978-3-319-54380-2_9
https://doi.org/10.1007/978-3-319-54380-2_9
Autor:
John San Miguel, Braulio Coronado, Lawrence Kerr, Josiah Bryan, Megan Kline, Maxine Major, Jose Romero-Mariona, Geancarlo Palavicini, Roger A. Hallman
Publikováno v:
2016 Cybersecurity Symposium (CYBERSEC).
With the increasing connectedness of traditionally isolated devices, such as those found in Supervisory Control and Data Acquisition (SCADA) networks, comes the increasingly complex challenge of providing appropriate cybersecurity controls. SCADA net
DoD-Centric and Independent Technology Evaluation Capability (DITEC) users may decided that certain capability examinations are less meaningful for them than others. This paper introduces a system of prioritizing capability tests with DITEC and an al
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::99f51dee79d554425e9b5260ffca51cd
https://doi.org/10.21236/ada619280
https://doi.org/10.21236/ada619280
Autor:
Candemir Cigsar, Angela Ng, John San Miguel, Anne-Marie Charpentier, Gelareh Zadeh, Cynthia Ménard, Eshetu G. Atenafu, G. Bahl, David C. Hodgson
Publikováno v:
International journal of radiation oncology, biology, physics. 85(2)
Stereotactic radiosurgery (SRS) for brain metastases is a relatively well-studied technology with established guidelines regarding patient selection, although its implementation is technically complex. We evaluated the extent to which local availabil
Autor:
Pierre Dönnes, John San Miguel, Hagit Shatkay, Torsten Blum, Scott Brady, Oliver Kohlbacher, Annette Höglund, Matthew Rocheford
Publikováno v:
Pacific Symposium on Biocomputing
Computational prediction of protein subcellular localization is a challenging problem. Several approaches have been presented during the past few years; some attempt to cover a wide variety of localizations, while others focus on a small number of lo