Buscar
Mostrando ítems 1-10 de 613
Cyber-security, privacy and trust: trends in the Latin American and Caribbean region and the way forward
(Banco Interamericano de Desenvolvimento, 2016)
The goals of cybersecurity strategies are usually twofold: i) To protect society against cyber threats; and ii) to foster economic and social prosperity, in a context in which key activities are based on the use of Information ...
Artificial Intelligence Tools for Cyber Attribution
(Springer, 2018)
Cyber attribution is the process by which the identity of an actor or aggressor in a cyberactivity is determined. Conducting this process presents several unique problems; chief among them are that the technical artifacts ...
Cibersegurança: um modelo para elaboração de exercícios de ataque e defesa em aplicações web
(Universidade Federal de Santa MariaBrasilUFSMCentro de Tecnologia, 2013-02-22)
There is a lack of skilled people to work with cyber security for frequent and danger web vulnerabilities. In this way, new tools and techniques for teaching cyber security should be incorporated into information technology ...
Security in smart objects, a general view at the physical and logical level
(Editorial de la Universidad Tecnica del Norte, 2019)
CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations
The lack of suitable datasets and evaluation processes entails one of the most challenging gaps on the digital transformation era, where data-driven solutions like machine learning algorithms constitute a key pillar of the ...
Security in cyberspace: dynamics, limits, and opportunities: a workshop report
(FGV Direito SPHIIGUFRGSUFSC, 2020-07)
This is the report of the workshop "Security in Cyberspace: dynamics, limits, and opportunities", held on the 14th of May 2020 and jointly organized by the Federal University of Rio Grande do Sul (UFRGS), the Federal ...
ARE ECUADORIAN MILLENNIALS PREPARED AGAINST A CYBERATTACK?
(Universidad Nacional de Chimborazo, 2020)