Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer security (9)
- Computer networks--Security measures (6)
- Cyberterrorism (4)
- College for Professional Studies (2)
- Command and control systems (2)
-
- Data protection (2)
- Information warfare--United States (2)
- Management information systems (2)
- School of Computer & Information Science (2)
- 2008 (1)
- Adaptive structuration theiry (1)
- Anomaly detection (Computer science) (1)
- Artificial satellites in telecommunications (1)
- Authentication and validation (1)
- Automatic theorem proving (1)
- Autonomy (1)
- Business continuity (1)
- Business networks (1)
- Complex adaptive systems (1)
- Complier (1)
- Computer Security (1)
- Computer crimes (1)
- Computer crimes--Prevention (1)
- Computer file sharing (1)
- Computer network protocols (1)
- Computer network security (1)
- Computer networks--Access control (1)
- Computer networks--Security measures--United States (1)
- Computer security--Government policy--United States (1)
- Computer simulation (1)
Articles 31 - 34 of 34
Full-Text Articles in Entire DC Network
Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead
Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead
Theses: Doctorates and Masters
In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant …
Application Of Computer Simulation Modeling To Evaluate Business Continuity Plans, Jose Francisco Molina Garcia Plaza
Application Of Computer Simulation Modeling To Evaluate Business Continuity Plans, Jose Francisco Molina Garcia Plaza
CCE Theses and Dissertations
Business continuity plans (BCP) help organizations plan for and withstand the occurrence of unexpected events that interrupt the normal operation of business. Managers typically develop several alternate plans to minimize the business impact of unexpected events. The problem for decision makers is that comparative evaluation of BCP is typically done using subjective judgments.
This research uses a case study approach focusing on a single organization and a single business continuity application to propose the use of computer simulation as a tool for managers to identify and evaluate different BCP prior to committing resources. In the context of an insurance firm, …
Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker
Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker
Master's Projects
With their ever increasing malicious capabilities and potential to infect a vast majority of computers on the Internet, botnets are emerging as the single biggest threat to Internet security. The aim of this project is to perform a detailed analysis of botnets and the vulnerabilities exploited by them to spread themselves and perform various malicious activities such as DDoS attacks. DDoS attacks are without doubt the most potent form of attacks carried out by botnets. In order to better understand this growing phenomenon and develop effective counter measures, it is necessary to be able to simulate DDoS attacks in a …
Fuzzy Range Query In Xml, Dexiong Zhang
Fuzzy Range Query In Xml, Dexiong Zhang
Master's Projects
This writing project presents a new approach to implement a fuzzy range query solution for retrieving Extensible Markup Language (XML) data. Ever since XML was introduced, it has become a web standard to describe data on the Internet. The need for performing range query against XML data is growing day by day. Many search service providers are eager to improve their solutions on range query against XML data. The project studies and analyzes the limitations on the current range query solutions. The project also proposes a new solution using fuzzy semantic analysis to quantify XML data so that it can …