Filters








39 Hits in 16.3 sec

The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game

Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi
2018 IEEE Transactions on Software Engineering  
ACKNOWLEDGMENTS This work is supported by UK Engineering and Physical Science Research Council Grant, Mumba: Multi-faceted metrics for ICS business risk analysis (EP/M002780/1), part of the UK Research  ...  The authors also wish to thank Alexander whose Lego play inspired the development of D-D.  ...  The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game Sylvain Frey , Awais Rashid, Member, IEEE, Pauline Anthonysamy, Maria Pinto-Albuquerque , Member, IEEE, and  ... 
doi:10.1109/tse.2017.2782813 fatcat:trdwb7ojvvaevkkr3mhmcjjb6m

Big Dat & I.A. para protección de anomalías

Pablo Ruiz, Rubén Correoso, Pedro Molina, Paula Gómez, Mª Ángeles García
2020 Zenodo  
Password policy: the good, the bad, and the ugly Autor: Password policy: the good, the bad, and the ugly Abstract: "We're secure! We use passwords!" How many of us have heard this claim?  ...  [Rosencrance] This paper focuses on the use of passwords and password policy and looks at the good, the bad and the ugly scenarios that arise.  ... 
doi:10.5281/zenodo.4388659 fatcat:xyine5m6cnckbc3sp3bx2elnsq

Legal Tech - Bringing Law into the "Twentieth" Century [chapter]

Tomasz Grzegory, Janos Puskas
2021 Legal Tech  
the Bad, and th e Ugly' (Prism Blog, 7 August 2019) <https://prismlit.com/predictive-coding/> accessed 26 February 2021; 53 Richard Susskind, Daniel Susskind, The Future of the Professions: How Technology  ...  even malware such as viruses, trojans and spyware.  ... 
doi:10.5771/9783748922834-81 fatcat:ov6yn7c3gfa5xhywmskgwo2yy4

Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS

Felix O. Olowononi, Danda B. Rawat, Chunmei Liu
2020 IEEE Communications Surveys and Tutorials  
Most research work have therefore focused on the detection of attacks in CPS.  ...  This paper is therefore aimed at comprehensively surveying the interactions between resilient CPS using ML and resilient ML when applied in CPS.  ...  However, it was limited to DL and there was no attention on resiliency of CPS. Liang et al [31] focused on the good, bad and ugly use of ML for cybersecurity in CPS/IoT.  ... 
doi:10.1109/comst.2020.3036778 fatcat:tyrz76ofxfejha5kwhoptv2hwu

PROMISE UNFULFILLED: A Brief History of Educational Wargaming in the Marine Corps

Sebastian J. Bae, Ian T. Brown
2021 MCU Journal  
This article offers a comprehensive historical overview of educational wargaming in the U.S. Marine Corps and how it can evolve in the future.  ...  The tradition of leveraging wargames for educational and training purposes is deeply rooted in the Marine Corps.  ...  Each had a diverse background in terms of participating in and conducting games, analytical and educational, in support of DOD requirements.  ... 
doi:10.21140/mcuj.20211202002 fatcat:ky5pgd2z5nb77fsytqkngolqdq

Artificial Intelligence and Robotics [article]

Javier Andreu Perez, Fani Deligianni, Daniele Ravi, Guang-Zhong Yang
2018 arXiv   pre-print
The global AI market is around 260 billion USD in 2016 and it is estimated to exceed 3 trillion by 2024.  ...  The recent successes of AI have captured the wildest imagination of both the scientific communities and the general public.  ...  It runs on top of the JVM. Very good support for distributed systems.  ... 
arXiv:1803.10813v1 fatcat:p2czbmak4jcyxbtncqfqlkxtma

Access controlled: the shaping of power, rights, and rule in cyberspace

2010 ChoiceReviews  
The matters only get weightier, in the case of bad outcomes, discerning between irresponsible company actions and good faith decisions, for instance, if the actions following a human rights impact assessment  ...  for acting in bad faith.  ...  in, [143] [144] ISPs in, 140  ... 
doi:10.5860/choice.48-2125 fatcat:pnspoirndfenlhq3urwsqomh2m

Desinformación en tiempos de pandemia: tipología de los bulos sobre la Covid-19

Ramón Salaverría, Nataly Buslón, Fernando López-Pan, Bienvenido León, Ignacio López-Goñi, María-Carmen Erviti
2020 El Profesional de la Informacion  
Our aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it.  ...  Machine learning techniques are escalating the technology's sophistication, making deep fakes ever more realistic and increasingly resistant to detection.  ...  Such diffusion has occurred in the past both through commercial and blackmarket means, as seen with graphic manipulation tools like Photoshop and malware services on the dark web.34 User-friendly capacity  ... 
doi:10.3145/epi.2020.may.15 fatcat:ihnoj7e6wvfrffejtc2hak7boa

Covid-19, una pandemia acompañada de infodemia

Estefanía Fajardo
2020 Global Rheumatology  
These principles have been developed to help readers discern good fact-checking from bad.  ...  bad.  ...  compromised by malicious actors including through phishing, malware attacks, and identity spoofing. 217 An example of this practice: Award-winning investigative journalist Jessikka Aro, who works for  ... 
doi:10.46856/grp.26.e029 fatcat:jws6rrlq5rbjxj4q2dn6ub76xy

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

Robert Chesney, Danielle Keats Citron
2018 Social Science Research Network  
Our aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it.  ...  Machine learning techniques are escalating the technology's sophistication, making deep fakes ever more realistic and increasingly resistant to detection.  ...  In the landmark 1964 decision New York Times v.  ... 
doi:10.2139/ssrn.3213954 fatcat:njtauzwpdzb4hp5kd3qd4yrp4i

Fostering Resilient Business Ecosystems and Economic Growth: Towards the Next Normal [article]

Amol Gawande, Atul Kumar
2022 Zenodo  
The Conference has been a good opportunity for participants from 100s of Institutes from India and abroad.  ...  , Business Analytics, International Business, Finance, and Accounting.  ...  There has been an increased understanding in many organizations of the importance of engaging employees in their quest for better performance through innovations that will decrease waste and ensure that  ... 
doi:10.5281/zenodo.6773034 fatcat:pshnor5irjadpnjtn2w4jl4qyi

API design matters

Michi Henning
2007 Queue  
Simply put, it is very easy to create a bad API and rather difficult to create a good one.  ...  In other words, the consultants never get to live through the consequences of their own design decisions, which is a perfect way to breed them into incompetence.  ...  Sanger's team has much ground to make up, and I wish them well. One might add a sad note: Are we seeing another "damn good cause" afflicted with a bad dose of the "schisms"? If ThIs BE Error...  ... 
doi:10.1145/1255421.1255422 fatcat:cjpfqt5y35ejbcmkvc24ig2o3y

Introduction

Sascha Engel, Jordan Laney, Anthony Szczurek, Christian Matheis
2015 Spectra  
philosophy and literature: the monster, the hybrid, the arriving stranger, the resilient resistance of never-assimilated remainders in representation and against representation.  ...  and literary sources to show sites of resistance in colonial and ethnological representations.  ...  But it's time for us to get beyond theological politics where all the good is analytically and programatically linked and so is all the bad.  ... 
doi:10.21061/spectra.v4i2.254 fatcat:yir5bmus7rcabkozlqmqfz42oy

Law, Virtual Reality, and Augmented Reality

Mark A. Lemley, Eugene Volokh
2017 Social Science Research Network  
display) that will a) monitor the signal coming in to the display, b) detect visual events that are known to trigger a seizure, and c) alter the signal to remove that stimulus."  ...  His floating hand box connected to a display) that will a) monitor the signal coming in to the display, b) detect visual events that are known to trigger a seizure, and c) alter the signal to remove that  ... 
doi:10.2139/ssrn.2933867 fatcat:orx2ivdj5nbave32wstfb65gpq

Great Power Blame Game: The Ongoing War of Words Over COVID-19

Melissa Conley Tyler, Asialink, Tiffany Liu, Asialink
2020 Melbourne Asia Review  
in supply chains and increased connectivity for goods and services.  ...  to facilitate and coordinate the mobilisation of support and resources from the UN and other development agencies are examples of leaders making strong, if unpopular, decisions to manage the crisis.  ... 
doi:10.37839/mar2652-550x2.17 fatcat:umdd6tuh2rgwnaiyuzwtsutovq
« Previous Showing results 1 — 15 out of 39 results