中图分类
执行
    报告类别
    执行
    中文(共0篇) 外文(共31篇)
    排序:
    导出 保存至文件
    [科技报告]   Sherman, M. S.        共16页
    摘要 : No abstract available

    [科技报告]          共112页
    摘要 : Cyber attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber... 展开

    [科技报告]   Callahan, M. E.        共19页
    摘要 : Pursuant to Initiative Three of the Comprehensive National Cybersecurity Initiative, DHS is engaging in an exercise to demonstrate a suite of technologies that could be included in the next generation of the Departmentfs EINSTEIN ... 展开

    [科技报告]   Kowalski, E.   Cappelli, D.   Moore, A.        共58页
    摘要 : The insider threat issue is a problem faced by all industries and sectors today. It is an issue of growing concern as the consequences of insider incidents can include not only financial losses, but the loss of clients and busines... 展开

    [科技报告]   Tehan, R.        共56页
    摘要 : Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and po... 展开

    [科技报告]   Tehan, R.        共52页
    摘要 : Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and po... 展开

    [科技报告]   Aissa, A. B.   Abercrombie, R. K.   Sheldon, F. T.   Mili, A.        共9页
    摘要 : In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operat... 展开

    [科技报告]   Tehan, R.        共31页
    摘要 : Critical infrastructure is defined in the USA PATRIOT Act (P.L. 107-56, Sec. 1016(e)) as “systems and assets, physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would ... 展开

    [科技报告]   McCarthy, C.   Harnett, K.        共27页
    摘要 : The primary objective of the work described in this report is to review the National Institute of Science and Technology (NIST) guidelines and foundational publications from an automotive cybersecurity risk management stand-poin... 展开

    [科技报告]   McCarthy, C.   Harnett, K.   Carter, A.        共46页
    摘要 : The primary objective of the work detailed in this report is to describe a composite modeling approach for potential cybersecurity threats in modern vehicles. Threat models, threat descriptions, and examples of various types of co... 展开

    研究趋势
    相关热图
    学科分类