scispace - formally typeset
Search or ask a question

Answers from top 6 papers

More filters
Papers (6)Insight
These findings suggest the importance of a careful focus on "how" broken windows policing programs are implemented.
Open accessJournal ArticleDOI
Ogletree, J Charles 
18 Citations
Perhaps the failure of reform is a result of a general lack of appreciation of the fundamental societal values that public defender services further.
The results demonstrate that our algorithms can significantly improve the utility of the defender, with reasonable computation time.
Proceedings ArticleDOI
04 Jul 2006
18 Citations
Finally, we establish that the increased power of the defender results in higher-quality protection of the network.
These observations motivate us to boost MRMs to the security context by extracting the behaviors of attacker and defender.
Our evaluation results show that MITC Defender is effective on defense against MITC attack and other security threats with a low cost.

See what other people are reading

How to use machine learning for checking automatic assessments of cybersecurity standards ?
4 answers
Machine learning can be used to check automatic assessments of cybersecurity standards. One approach is to develop a platform for cybersecurity education that provides auto constructive feedback for command line practices. This platform can be used with a user interface or command line and has customizable hands-on exercises for users. Another approach is to use machine learning algorithms to analyze data collected during hands-on cybersecurity training sessions. Data mining and machine learning techniques can be employed to analyze trainees' interactions with the learning environment, revealing their typical behavior, mistakes, solution strategies, and difficult training stages. These methods can help assess trainees, support them, and improve the training design. Additionally, machine learning can be used for intrusion detection systems in cybersecurity. Machine learning-based intrusion detection systems can examine threats and respond to intrusions and security incidents swiftly.
What are the current research gaps in the field of Information Systems (IS) within businesses?
5 answers
The current research gaps in the field of Information Systems (IS) within businesses include a focus on early AI technologies in academic research, while practitioner interest in AI has been more diverse. There is a gap between IS research and practice, which can be managed by accepting and embracing the differences between the two and utilizing "boundary spanners" as human agents to bridge the gap. Limited research in IS has incorporated a rich conceptualization and discussion of time, highlighting the need for researchers to consider and incorporate time into their theory and study designs. The IS curriculum in universities may not align with the desired skills from employers, with gaps identified in areas such as security and project management. There is a gap between academic research and its utilization by industry practitioners, which can be addressed by considering criteria such as value, velocity, visibility, voice, and verifiability throughout the research process.
Is NFC a secure technology to keep peoples' informations secure?
5 answers
NFC technology is vulnerable to security attacks and data stealing, making it a potential threat to keeping people's information secure. The protocols and devices implementing NFC have known vulnerabilities, and there is a risk associated with using certain NFC devices, such as contactless bank cards. However, there are efforts to improve the security of NFC technology, such as proposing new authentication protocols that provide privacy, integrity, and protection against various types of attacks. These proposed schemes aim to prevent unauthorized access, modification, and blocking of communication messages in NFC systems. While NFC technology has its vulnerabilities, ongoing research and the development of secure authentication schemes show promise in enhancing the security of NFC-based systems and protecting people's information.
How To Showcase SecOps Metrics That Matter?
4 answers
To showcase SecOps metrics that matter, it is important to translate security information into business terms, identify appropriate metrics, and measure them accurately. Implementing visual analytics techniques can assist in displaying security metrics and evaluating the efficiency of protection mechanisms. Developing a framework for security metrics that is scope-definitive, objective-oriented, reliable, simple, adaptable, and repeatable can provide insights into security states and vulnerabilities in industrial operational environments. Additionally, setting the right targets and accurately measuring site reliability metrics can lead to improved service performance and user adoption. By following these steps, security professionals can effectively communicate the value of security projects and demonstrate improvement to the management team.
Can brute force attacks be prevented or mitigated in open WiFi networks?
5 answers
Brute force attacks can be prevented or mitigated in open WiFi networks. One approach is to generate a visual warning in the web browser's graphical user interface (GUI) when a website is unsecured and the network is open WiFi. Another method involves using a Multi Level Perceptron (MLP) Artificial Neural Network (ANN) to distinguish normal traffic from brute force attack traffic. Additionally, a method and system have been developed to prevent WiFi from being cracked through brute force by performing hash checking on equipment and hardware information, recording connection authentication time, and authenticating based on equipment fingerprint and connection authentication time. Furthermore, a game theory model has been proposed as the basis for an algorithm to prevent intrusions in WiFi networks. Another method involves utilizing a decision tree to judge whether an access behavior corresponds to a brute force cracking behavior and performing blocking operations if necessary.
How logic represnation helps overcome langauge complexitiy?
4 answers
Logic representation helps overcome language complexity by providing a structured and systematic approach to understanding and processing natural language discourse. It allows for the representation of complex concepts and relationships in a simple and uniform way, making it easier to analyze and interpret the meaning of language. For example, a logic-based system called Spaceprobe5 uses partitioned representations to distribute discourse content appropriately over multiple spaces, enabling the processing of semantically complex discourse. Logic models, another form of logic representation, can be used to conceptualize and analyze complex programs, identify causal factors, and guide the systematic review process in fields such as social and health outcomes. By applying logic as a practical linguistic complexity measure, politicians can assess the complexity of their language and make adjustments to improve public understanding. Overall, logic representation provides a powerful tool for managing and overcoming language complexity in various domains.
What is cutting classes problem in global?
4 answers
The cutting classes problem in the global context refers to the Global Label Min-Cut problem, where the edges of a graph are labeled or partitioned into color classes or hedges. The objective is to disconnect the graph at minimum cost by removing all edges of the same label. While the st-cut version of the problem is known to be NP-hard, there is a quasi-polynomial randomized algorithm that runs in n^{O(log OPT)}-time, suggesting that the problem is in P. However, recent research shows that this problem is not in P, and the quasi-polynomial running time is likely optimal. The existence of an algorithm with running time (np)^{o(log n/ (log log n)^2)} would contradict the Exponential Time Hypothesis, indicating the hardness of the problem.
How does the design of captchas impact individuals with dyslexia?
5 answers
The design of captchas can have a significant impact on individuals with dyslexia. Dyslexics often struggle with passwords and alphanumeric authentication mechanisms due to their difficulties with spelling, processing, sequencing, and retention. Captchas that rely heavily on distorted texts can be particularly challenging for dyslexics, leading to more negative attitudes towards captchas. However, there are potential solutions that can improve accessibility for dyslexic users. One study suggests using short common phrases instead of random digits, which can enhance memorability and success rates for visually impaired users. Another study proposes an audio-based captcha called HearAct, which allows users to solve captchas using gestures instead of typing, making it more accessible for users with visual impairments. These insights can help in developing and implementing captcha solutions that are suitable for individuals with dyslexia and other learning disabilities.
What is the impact of information culture on information governance?
5 answers
Information culture has a significant impact on information governance. Organizational culture influences the effectiveness of information governance, especially in terms of information security, the presence of an IG council, and the use of automated systems for information management. The study conducted in higher education institutions (HEIs) found that competition/result-oriented and control/hierarchy cultures positively influence information governance effectiveness. Trust is highlighted as a crucial factor in driving governance processes and enabling collaboration in organizations. The role of organizational culture is crucial in formulating harmonious strategies of IT utilization policy with business strategy, making it a key factor for success in IT governance. Municipalities, as institutions that interact intensely with citizens, need to handle information effectively to ensure efficient service delivery and promote accountability and transparency.
Can be iso/iec 27014 implemnt without 27001?
5 answers
ISO/IEC 27014 cannot be implemented without ISO/IEC 27001. ISO/IEC 27001 is the standard that defines the requirements and process for implementing an Information Security Management System (ISMS). ISO/IEC 27014, on the other hand, provides guidelines for governance of information security management systems, including the establishment, implementation, maintenance, and continual improvement of the ISMS. Therefore, ISO/IEC 27014 builds upon ISO/IEC 27001 and is dependent on its implementation. The two standards work together to ensure effective information security management and risk mitigation.
How do mathematicians prove the primality of large numbers using advanced algorithms and techniques?
5 answers
Mathematicians prove the primality of large numbers using advanced algorithms and techniques. One approach is to use probabilistic tests like the Miller-Rabin test, Solovay-Strassen test, and Fermat's test, which use randomness and have a small probability of misclassifying a composite number as prime. Another approach is the AKS theorem, which is a deterministic algorithm for primality testing. Additionally, there are algorithms that check the primality of numbers of specific forms, such as h⋅2^n ± 1, where h<2^n is odd, and n is a positive integer. Some algorithms, like the one proposed by Pevnev, use pseudo-simple numbers and focus on the sum of possible components to determine primality. These algorithms are implemented and tested for efficiency and accuracy.