Cyber

Results: 13321



#Item
11Avionics / Aircraft instruments / Aviation / Technology / Human behavior / Air traffic control / OpenSky Network / ACARS / Automatic dependent surveillance  broadcast / FlightAware / VHF Data Link / Data link

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-06-20 05:20:16
12Knowledge representation / Search algorithms / Network theory / Mathematics / Connectivity / Tree / Breadth-first search / Discrete mathematics / Combinatorics / Networks / Centrality

2010 International Conference on Distributed Computing Systems Optimizing the Spatio-Temporal Distribution of Cyber-Physical Systems for Environment Abstraction Linghe Kong, Dawei Jiang, Min-You Wu Shanghai Jiao Tong Un

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:01:50
13Constructible universe / Mathematical logic / Mathematics / Set theory / Operator theory / Partial differential equations / Proof theory / Ordinal numbers / Moschovakis coding lemma / Symbol

VeriPhy: Verified Controller Executables from Verified Cyber-Physical System Models Brandon Bohrer Yong Kiam Tan

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2018-05-02 15:22:10
14Model checkers / Software engineering / Formal methods / Theoretical computer science / Software quality / Computing / PRISM model checker / Model checking / Formal verification / Markov chain / Stochastic / Reliability engineering

Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-09-02 06:46:32
15Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
16Cybercrime / Cyberwarfare / Computer security / Security / National security / Cyberattacks / Cyberterrorism / Internet privacy / Social networking service / Stuxnet / Risk / Strategic management

Blind in the Panopticon The decreasing marginal utility of access to information as an aspect of cyber policy The uncertain price of information There is no clear way, in the present, of deciding what information will be

Add to Reading List

Source URL: files.howtolivewiki.com

Language: English - Date: 2014-04-16 01:17:19
17Software testing / Computer security / Cybercrime / Security / Computing / National security / Hacking / Fuzzing / Artificial intelligence / Human-based computation / Vulnerability / Cyber Grand Challenge

Rise of the HaCRS:Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
18Cyberwarfare / Security / Cooperative Cyber Defence Centre of Excellence / National security / Security engineering / United States Department of Homeland Security / Safety / Prevention / Proactive cyber defence / Tallinn / Tallinn Manual

NATO Cooperative Cyber Defence Centre of Excellence (the Centre) is a NATO-accredited International Military Organisation dealing with education, consultation, lessons learned, research and development in the field of cy

Add to Reading List

Source URL: www.ccdcoe.org

Language: English - Date: 2018-02-21 05:17:56
19Security / Cybercrime / National security / Prevention / Cyberwarfare / Computer security / Security engineering / Cooperative Cyber Defence Centre of Excellence / Cyberattack / Proactive cyber defence

JUNIOR SCHOLAR AWARD The 9th International Conference on Cyber Conflict, focusing on the theme Defending the Core, invites junior scholars to submit Master’s theses for the Junior Scholar Award. The purpose of this CyC

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2016-12-14 08:22:09
20System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
UPDATE