Sep 4, 2019 | Book, Research library
One of the significant challenges in the realm of cyber attack detection is the scarcity of training data, which remains a formidable obstacle. Despite the utilization of established network monitoring tools like Wireshark, a vast number of individuals are still at...
Aug 23, 2019 | Research library
This review examines the current trends in understanding the impact of individuals’ decisions to either disclose information or continue to conceal it. As a whole, the evidence points to a relative benefit of disclosure over secret-keeping, but with clear cases,...
Aug 3, 2019 | Research library
The evolution of technology over the years has allowed people to more easily store, access, and share information on the Internet. People can bank online, shop, and post their latest life news. Unfortunately, all this available information has attracted the attention...
Aug 1, 2019 | Research library
The purpose of this study is to describe the effect of education in professional boundaries on the use and management of social media by using quantitative survey methods to ask “What are the social networking behaviours of student nurses following education in...
Aug 1, 2019 | Research library
Cybersecurity professionals in the federal government work on complex problems in organizations where they have multiple competing roles. In addition, the gap between workers with cyber skills and job openings means that current cybersecurity professionals must carry...
Aug 1, 2019 | Research library
This study leverages reinforcement learning techniques to identify optimal strategies for cyber defense. These techniques are applied within a cybersecurity game framework, resulting in a continuous, adversarial decision-making scenario between two agents – an...