Narrow your search

Library

Vlaams Parlement (139)

KU Leuven (128)

ULiège (126)

ULB (124)

UCLL (120)

Odisee (119)

Thomas More Mechelen (119)

VIVES (119)

Thomas More Kempen (118)

LUCA School of Arts (117)

More...

Resource type

book (109)

periodical (30)


Language

English (108)

Undetermined (23)

French (5)

German (1)

Miscellaneous languages (1)

More...

Year
From To Submit

2023 (14)

2022 (9)

2021 (8)

2020 (17)

2019 (7)

More...
Listing 1 - 10 of 139 << page
of 14
>>
Sort by

Book
Improving C2 and situational awareness for operations in and through the information environment
Author:
Year: 2018

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Managing Response to Significant Cyber Incidents: Comparing Event Life Cycles and Incident Response Across Cyber and Non-Cyber Events
Authors: --- --- --- --- --- et al.
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber incident response has evolved based on systems and processes developed for other types of incident response, such as response to natural hazards. Large-scale cyber incidents that would have an impact on the United States' national and homeland security, economic security, and public safety and welfare to date are rare. However, they may have additional complications that make them more complex to plan for, including challenges in distinguishing the early stages of a significant cyber incident from a more quotidian incident, and the diversity of stakeholders involved. In this report, RAND researchers compare and contrast incident response for cyber and other types of hazards, both human-caused and natural, to derive initial insights into their similarities and distinctions. The report suggests some ways to improve preparedness for cyber incident response and propose additional areas requiring further research. Recommendations include developing more rigorous and dynamic joint public-private exercises, conducting further analysis to identify how systems could fail through a cyber attack to inform early warning efforts, and developing decision mechanisms and shared understandings that will facilitate coordinated activation and execution of incident response plans.


Book
Digital infrastructure and digital presence : a framework for assessing the impact on future military competition and conflict

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information and intelligence - and the degree of access to and control of the systems within which the data reside - can yield power and influence at scale. These systems and the networks they create collectively make up digital infrastructure (DI). Spawned from internet growth and the interconnectivity of global telecommunication networks, today's DI - and a country's ownership of, access to, and control over it - has emerged as an area of competition between the United States and China. Beijing and Washington rely on DI to support military forces and use its capabilities to expand national power and extend influence globally. Both countries now aim to shape the DI in ways that align with their long-term strategic priorities and interests. This report defines DI, characterizes the competition for it, and provides evidence showing that how DI evolves carries implications for long-term military competition and conflict. The authors also describe important trends and asymmetries shaping the competition and conclude by discussing the implications and opportunities for the U.S. government and the U.S. Department of Defense.


Book
Alternative futures for digital infrastructure : insights and considerations for the Department of Defense
Authors: --- --- --- --- --- et al.
Year: 2023 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

A competition for digital infrastructure (DI) is underway between the United States and China, which has implications for military forces and operations that rely on this infrastructure in competition and conflict. However, DI as a competition remains largely understudied in a comprehensive way. This report is a product of a multiyear research effort to define DI, characterize the competition underway, identify key factors shaping outcomes, and assess the potential implications for the Department of Defense. This report contributes to the broader understanding of DI by presenting an alternative futures analysis of how the global DI could evolve out to 2050 and the military implications of those futures for the United States and China.


Book
Recovery plan for the communications and information technology sector after Hurricanes Irma and Maria : laying the foundation for the digital transformation of Puerto Rico
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

After the devastating 2017 hurricane season, the U.S. Homeland Security Operational Analysis Center supported the congressionally mandated economic and disaster recovery plan, Transformation and Innovation in the Wake of Devastation: An Economic and Disaster Recovery Plan for Puerto Rico. This report contributes to the overall plan with a focus on the communications and information technology (IT) sector. Researchers provide an introduction to the sector (brief history, key assets, prestorm conditions and challenges, and governance); assess damage and needs of the sector; and present 33 courses of action (COAs) for the recovery, rebuilding, and enhancement of the sector with an emphasis on developing and sustaining a resilient, state-of-the-art communications network and furthering the vision for the digital transformation of Puerto Rico. Developed in consultation with a wide variety of stakeholders, including governmental entities, commercial providers, citizens, and municipalities, the COAs address many different (and sometimes competing) needs and also support and benefit COAs in other critical sectors, such as health and social services. The relationships among the communications and IT COAs are outlined. The estimated cost for these COAs is


Periodical
Journal of big data.
Year: 2014 Publisher: Heidelberg, Germany : Springer-Verlag, GmbH,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Journal of Big Data publishes high-quality, scholarly research papers, methodologies and case studies covering a broad range of topics, from big data analytics to data-intensive computing and all applications of big data research. The journal examines the challenges facing big data today and going forward including, but not limited to: data capture and storage; search, sharing, and analytics; big data technologies; data visualization; architectures for massively parallel processing; data mining tools and techniques; machine learning algorithms for big data; cloud computing platforms; distributed file systems and databases; and scalable storage systems.


Book
Implications of aggregated DoD information systems for information assurance certification and accreditation
Authors: ---
Year: 2010 Publisher: Santa Monica, CA : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The challenges associated with securing U.S. Department of Defense (DoD) information systems have grown as the department's information infrastructure has become more complex and interconnected. At the same time, the potential negative consequences associated with cyber intrusions have become more severe. Are current information assurance (IA) policies and procedures sufficient to address this growing threat, and are they able to address vulnerability issues associated with highly networked information systems? The current IA certification and accreditation (C&A) process focuses on individual, discrete systems or components of larger, aggregated information systems and networks that are colocated or operate on the same platform (such as a Navy ship). An examination of current policy shows that a new approach is needed to effectively extend the IA C&A process to aggregations of information systems and improve the security of DoD information systems. A number of recommendations are put forth to improve current IA policy and to enable the IA C&A of aggregations of DoD information systems that reside on a common platform.


Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica RAND Corp.

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.


Book
Parallel and distributed computing
Author:
ISBN: 9535159097 9533070579 Year: 2010 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 14 chapters presented in this book cover a wide variety of representative works ranging from hardware design to application development. Particularly, the topics that are addressed are programmable and reconfigurable devices and systems, dependability of GPUs (General Purpose Units), network topologies, cache coherence protocols, resource allocation, scheduling algorithms, peertopeer networks, largescale network simulation, and parallel routines and algorithms. In this way, the articles included in this book constitute an excellent reference for engineers and researchers who have particular interests in each of these topics in parallel and distributed computing.

Listing 1 - 10 of 139 << page
of 14
>>
Sort by