5,977 research outputs found

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Quantum Applications In Political Science

    Get PDF
    Undergraduate Research ScholarshipThis paper will show the current state of quantum computation and its application as a political science research method. It will look at contemporary empirical literature to assess the current state of the method in both political science and computer science. Then, by assessing the state of quantum computation, this paper will make predictions concerning quantum computation as a research tool and also assess its capability as a catalyst for international diplomacy and discourse. Quantum computation is an emerging technology with increasing scientific attention. This paper will use IBM’s quantum computer, accessed through the cloud, to model and execute quantum algorithms that show the utility for political science research. Furthermore, through the base mathematics of common quantum algorithms, this paper will show how these algorithms can be expanded. This paper finds that quantum computation is a valuable tool with remarkable potential. However, quantum computing has its limitations and currently resides in an important juncture that will decide whether technology involving it will be resigned as a niche theoretical tool or be continued to be developed into a mainstream technology.No embargoAcademic Major: World Politic

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    SciTech News Volume 71, No. 1 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11 Reviews Sci-Tech Book News Reviews 12 Advertisements IEEE
    • …
    corecore