Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Nguyen, Tam N."'
Autor:
Nguyen, Tam n.
Large Language Models (LLMs) have the potential to enhance Agent-Based Modeling by better representing complex interdependent cybersecurity systems, improving cybersecurity threat modeling and risk management. However, evaluating LLMs in this context
Externí odkaz:
http://arxiv.org/abs/2406.06863
Autor:
Nguyen, Tam N.
Publikováno v:
Future Generation Computer Systems (FGCS), 2024
Serverless cloud is an innovative cloud service model that frees customers from most cloud management duties. It also offers the same advantages as other cloud models but at much lower costs. As a result, the serverless cloud has been increasingly em
Externí odkaz:
http://arxiv.org/abs/2304.00396
Autor:
Nguyen, Tam N.
Publikováno v:
JMIRx Med 2022;3(2):e33502
Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response to the expanding ever-more-complex threat landscape, Digital Twins (DTs) and particularly Human Digital Twins (HDT
Externí odkaz:
http://arxiv.org/abs/2108.00551
Autor:
Nguyen, Tam n.
Publikováno v:
In Future Generation Computer Systems April 2024 153:312-325
Autor:
Nguyen, Tam N.
Human psychology plays an important role in organizational performance. However, understanding our employees is a difficult task due to issues such as psychological complexities, unpredictable dynamics, and the lack of data. Leveraging evidence-based
Externí odkaz:
http://arxiv.org/abs/2001.09743
Cybersecurity training should be adaptable to evolving the cyber threat landscape, cost effective and integrated well with other enterprise management components. Unfortunately, very few cybersecurity training platforms can satisfy such requirements.
Externí odkaz:
http://arxiv.org/abs/1812.04234
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Nguyen, Tam N.
CEH v.10 Certification Self-study Course is an online course preparing learners for one of the most prestige cyber security certifications in the world - the Certified Ethical Hacker (CEH) v.10 Certification. Due to a pay wall and the practical rathe
Externí odkaz:
http://arxiv.org/abs/1811.02887
Autor:
Nguyen, Tam N.
Publikováno v:
2018 2nd Cyber Security in Networking Conference (CSNet)
Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the
Externí odkaz:
http://arxiv.org/abs/1804.03539
Autor:
Nguyen, Tam N.
Machine learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking emerge. Compromising machine
Externí odkaz:
http://arxiv.org/abs/1705.00564