Cyber University

Results: 576



#Item
361Industrial automation / Computer network security / Cyberwarfare / SCADA / DNP3 / Modbus / IEC 60870-6 / Stuxnet / Industrial control system / Technology / Automation / Telemetry

A Taxonomy of Cyber Attacks on SCADA Systems Bonnie Zhu, Anthony Joseph, Shankar Sastry Department of Electrical Engineering and Computer Sciences University of California at Berkeley, CA {bonniez,adj,sastry}@eecs.berkel

Add to Reading List

Source URL: bnrg.cs.berkeley.edu

Language: English - Date: 2011-09-21 18:45:10
362Behavior / Bullying / Behavioural sciences / Persecution / Injustice / Cyber-bullying / Victimisation / Abuse / Ethics / Social psychology

The current study assesses university students’ attitudes toward bullying, comparing attitudes toward traditional bullying (TB) with attitudes toward cyberbullying (CB[removed]University of Winnipeg students enrolled in

Add to Reading List

Source URL: www.prevnet.ca

Language: English - Date: 2013-05-06 17:36:23
363Cyberwarfare / Counter-intelligence / Intelligence analysis / Military intelligence / Counterintelligence / Computer security / Cyber-security regulation / Espionage / Security / National security

Remarks by the National Counterintelligence Executive Dr. Joel F. Brenner Applied Research Laboratories University of Texas at Austin Business Strategies in Cyber Security and Counterintelligence April 3, 2009

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2012-07-27 11:39:53
364Hacking / United States Department of Homeland Security / Military / Net-centric / United States Cyber Command / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Department of Defense Cyber Crime Center / Cyberwarfare / Computer crimes / Military science

August[removed]Defense Horizons National Defense University David J. Kay is a Research Analyst

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-03-06 11:49:14
365Crime / Cyberterrorism / Internet-related prefixes / Cambridge University Press / War / Computer crimes / Cyberwarfare / Terrorism

Cambridge University Press[removed]5 - Managing Cyber Attacks in International Law, Business, and Relations: In search of cyber peace Scott J. Shackelford Copyright Information More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2014-05-29 10:30:32
366Security / Public safety / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Internet service provider / United States Department of Homeland Security / Cyberterrorism / National Cyber Security Division / Computer crimes / Cyberwarfare / Crime

Cambridge University Press[removed]The Law and Economics of Cybersecurity Edited by Mark F. Grady and Francesco Parisi Index More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2006-11-25 13:41:56
367International Telecommunication Union / Computer security / Crime / Law enforcement / Computer crimes / Security / International Multilateral Partnership Against Cyber Threats

Cambridge University Press[removed]The Law and Economics of Cybersecurity Edited by Mark F. Grady and Francesco Parisi Excerpt More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2006-11-25 13:41:56
368Cyberbully / Ethics / Crime / Criminology / Abuse / Bullying / Cyber-bullying

RESEARCH SUMMARY Cyberbullying Victimization Sameer Hinduja, PhD (Florida Atlantic University) and Justin W. Patchin, PhD (University of Wisconsin-Eau Claire) recently completed an online survey of approximately 1,500 In

Add to Reading List

Source URL: www.cyberbullying.us

Language: English - Date: 2014-11-07 12:24:12
369Geography of California / Science and technology in the United States / California / Lawrence Livermore National Laboratory / Livermore /  California / University of California / Pacific Northwest National Laboratory / Battelle Memorial Institute / United States Department of Energy National Laboratories / Livermore Valley

Commercializing Government Technologies: A View From Both Sides of the Table 2013 Cyber Security Division Transition to Practice (TTP) Technology Demonstrations for Investors, Integrators, and IT Companies (I3) – West

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-09-05 10:47:30
370Military technology / Military science / United States Cyber Command / Military organization / War / Last Poems / American Society for Political and Legal Philosophy / Cyberwarfare / Electronic warfare / Hacking

Cambridge University Press[removed]5 - Managing Cyber Attacks in International Law, Business, and Relations: In search of cyber peace Scott J. Shackelford Index More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2014-05-29 10:30:32
UPDATE