[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

User, usage and usability: Redefining human centric cyber security

M Grobler, R Gaire, S Nepal - Frontiers in big Data, 2021 - frontiersin.org
The effectiveness of cyber security measures are often questioned in the wake of hard hitting
security events. Despite much work being done in the field of cyber security, most of the …

Impact analysis of cyber attacks on smart grid: A review and case study

TO Olowu, S Dharmasena, A Hernandez… - New Research Directions …, 2021 - Springer
This chapter presents a comprehensive review of the impacts of cyber attacks on the smart
distribution grid and discusses the potential methods in the literature to mitigate them. The …

Infusing design thinking into a software engineering capstone course

M Palacin-Silva, J Khakurel… - 2017 IEEE 30th …, 2017 - ieeexplore.ieee.org
Software engineering (SE) educators are challenged to balance the scope and depth in their
courses to train students in skills which will fulfill the ever-evolving industry needs. Capstone …

Log analysis of cyber security training exercises

RG Abbott, J McClain, B Anderson, K Nauer… - Procedia …, 2015 - Elsevier
Cyber security is a pervasive issue that impacts public and private organizations. While
several published accounts describe the task demands of cyber security analysts, it is only …

Efficient query evaluation on large textual collections in a peer-to-peer environment

J Zhang, T Suel - Fifth IEEE International Conference on Peer …, 2005 - ieeexplore.ieee.org
The authors studied the problem of evaluating ranked (top-k) queries on textual collections
ranging from multiple gigabytes to terabytes in size. The authors focused on the case of a …

[图书][B] Distributed heterogeneous multi sensor task allocation systems

I Tkach, Y Edan - 2020 - Springer
Heterogeneous sensor system research can gain from exploring approaches commonly
found in swarm intelligence and task administration protocols. This book includes the …

[PDF][PDF] Efficient minimum cost matching using quadrangle inequality

A Aggarwal, A Bar-Noy, S Khuller… - … on Foundations of …, 1992 - researchgate.net
We present efficient algorithms for finding a minimum cost perfect matching, and for solving
the transportation problem in bipartite graphs, G=(Red U Blue, Red x Blue), where|| Red …

Dualtrust: A distributed trust model for swarm-based autonomic computing systems

W Maiden, I Dionysiou, D Frincke, G Fink… - … Workshop, DPM 2010 …, 2011 - Springer
For autonomic computing systems that utilize mobile agents and ant colony algorithms for
their sensor layer, trust management is important for the acceptance of the mobile agent …

An attempt at defining cyberdefense situation awareness in the context of command & control

W Mees, T Debatty - 2015 International Conference on Military …, 2015 - ieeexplore.ieee.org
In this paper we present an overview of the most important views on situation awareness in
literature. We then go on to apply these concepts to cyberdefense. The main contribution of …