Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Terry Mayfield"'
Autor:
Edward A. Feustel, Terry Mayfield
Publikováno v:
ACM SIGOPS Operating Systems Review. 32:3-22
The Department of Defense (DoD) Goal Security Architecture (DGSA) introduces a broader view of information security from that previously held by the Department, one which has much more in common with the requirements of an inter-networked commercial
The objective of this study was to assess information technology tools to counter asymmetric threats when considered as complex adaptive systems (CASs). We focused primarily on the use of agent-based modeling and simulation technology. This report de
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c44c9899feb40cb9450bbe93b61a053e
https://doi.org/10.21236/ada464073
https://doi.org/10.21236/ada464073
Autor:
Myong H. Kang, Terry Mayfield
Publikováno v:
SPIE Proceedings.
In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9781475764116
DBSec
DBSec
Since 1994 and the explosive growth of the Internet, there has been a grow-ing awareness of the need for more research and development activities directed at protecting networked information systems and those critical national infrastructures that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dcc9a98812cb49a1c5fb29eeb74bb29c
https://doi.org/10.1007/978-0-387-35508-5_7
https://doi.org/10.1007/978-0-387-35508-5_7
For many years, the security research community has focused on the confidentiality as security, an a solid analytical foundation for addressing confidentiality issues has evolved. Now it is recognized that integrity is at least as important as confid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8f360285e2ecaacdd6d887998460c425
https://doi.org/10.21236/ada253989
https://doi.org/10.21236/ada253989
For many years, the security research community has focused on the confidentiality aspect of security, and a solid analytical foundation for addressing confidentiality issues has evolved. Now it is recognized that integrity is at least as important a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::31515acae634e61f878316ea0fa31e8c
https://doi.org/10.21236/ada253990
https://doi.org/10.21236/ada253990
This document reports on the feasibility of developing a decision support tool that could aid decision makers in formulating policies for the use of software standards and strategies for technology insertion. During the first phase (1983-1984) a whit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d0127d12f4093727d2d141efaba78f54
https://doi.org/10.21236/ada175352
https://doi.org/10.21236/ada175352