Cybersecurity共6篇

Government Acquisition of Cyber Technologies

Government Acquisition of Cyber Technologies-问军
Research Question How can federal entities acquire cyber technology rapidly while balancing risk tolerance? Effective and efficient cyber acquisition has proven to be a challenge f...
凌云的头像-问军凌云2月27日 22:28
3512

Technological and Economic Threats to the U.S. Financial System

Technological and Economic Threats to the U.S. Financial System-问军
Research Questions What are the emerging threats that the U.S. financial markets face, and what are the risks they pose?How might these evolving threats be detected, and what count...
凌云的头像-问军凌云2月27日 19:18
4414

The Evolution of the Post-Quantum Cyber Environment

The Evolution of the Post-Quantum Cyber Environment-问军
Quantum computers are expected to one day be capable of breaking public key cryptography, enabling a step change in cyberwarfare capabilities. Risk can be mitigated using new quant...
凌云的头像-问军凌云2月2日 00:11
00

Cybersecurity and Supply Chain Risk Management Are Not Simply Additive

Cybersecurity and Supply Chain Risk Management Are Not Simply Additive-问军
Research Questions How do cyber-related risks differ from or compound other concerns about SCRM?What do, or could, these differences mean for risk assessment, risk mitigation, and ...
凌云的头像-问军凌云2月2日 00:11
10

Understanding the Limits of Artificial Intelligence for Warfighters

Understanding the Limits of Artificial Intelligence for Warfighters-问军
Research Questions What warfighting applications could be used as potential use cases?What type of data is needed to train and test AI systems?What are the limitations of AI algori...
凌云的头像-问军凌云2月2日 00:11
60

Understanding the Limits of Artificial Intelligence for Warfighters

Understanding the Limits of Artificial Intelligence for Warfighters-问军
Research Questions Are cybersecurity datasets affected by distributional drift, and if so, how are they affected?How can distributional drift be detected and characterized in cyber...
凌云的头像-问军凌云2月2日 00:11
20