Showing 1 - 10 of 18 results for the Publish Year - 2016 , Type - White Paper
This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.
he goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field.
In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.
This paper reviews the issue of cyber awareness and identify efforts to combat this deficiency and concludes with strategies moving forward.
This white paper, which is the latest in a series of regular updates, builds upon the analysis of blacklists presented in our 2013 and 2014 reports.
Pervasive mobile computing focuses on how soldiers and first responders can use smartphones, tablets, and other mobile/wearable devices at the tactical edge.
Ultra-large-scale systems are interdependent webs of software, people, policies, and economics. In socio-adaptive systems, human and software interact as peers.
Predictability by construction (PBC) makes the behavior of a component-based system predictable before implementation, based on known properties of components.
A resilience-based approach can help financial services organizations to manage cybersecurity risks from outsourcing and comply with federal regulations.
This report describes a test of an algorithm for estimating the complexity of a safety argument.