The most common application of artificial immune networks (AINs) is on unsupervised learning tasks. This is due to the fact that AINs are inspired by the adaptive immune system, which consists of a network of antibodi...
详细信息
Pinus Radiata trees form pollen-producing catkins that can be harvested for pharmaceutical uses. Unmanned Aerial Vehicles (UAVs) may be well suited to the task of autonomously harvesting these catkins. We propose a me...
详细信息
Column-oriented databases have emerged as effective solutions for handling massive amounts of data, and data compression plays a crucial role. Attribute columns are divided into blocks and stored in separate files, an...
详细信息
We study the problem of selecting the contention window (CW) for age of information (AoI)-oriented IEEE 802.11 networks using deep reinforcement learning (DRL) techniques. AoI quantifies information freshness and is d...
详细信息
Ensemble learning for big data has been successful in machine learning and has great advantages over other learning methods. The ensemble model based on Random Sample Partition (RSP) is a prominent method of it. Altho...
详细信息
Legal judgment prediction aims to predict the judgment result based on the case fact description. It is an important application of natural language processing within the legal field. To enhance the impartiality and c...
详细信息
Federated learning allows multiple parties to jointly train deep learning models without the need for any participants to reveal their private data to a centralized server. However, this form of privacy-preserving col...
详细信息
In recent years, the combination of deep reinforcement learning and unmanned aerial vehicle (UAV) to achieve autonomous flight has been a hot research field. In this paper, an obstacle avoidance navigation algorithm (...
详细信息
Fashion complementary recommendation has always been crucial in the field of recommendation. In previous work, researchers did not pay attention to the connection and combinability between multi-dimensional image feat...
详细信息
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute an...
详细信息
ISBN:
(纸本)9781914587702
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute and innovative in their techniques and operations globally. These intensifying cyber risks and incidents suggest that cyber capability is inversely proportional to cyber risks, threats and attacks. Therefore, this confirms an emergent and critical need to adopt and invest in intelligence strategies, predominantly cyber counterintelligence (CCI), which is a multi-disciplinary and proactive measure to mitigate risks and counter cyber threats and cyber-Attacks. Concurrent with the adoption of CCI is an appreciation that requisite job roles must be defined and developed. Notwithstanding the traction that CCI is gaining, we found no work on a clear categorisation for the CCI job roles in the academic or industry literature surveyed. Furthermore, from a cybersecurity perspective, it is unclear which job roles constitute the CCI field. This paper stems from and expands on the authors prior research on developing a CCI Competence Framework. The proposed CCI Competence Framework consists of four critical elements deemed essential for CCI workforce development. In order of progression, the Framework s elements are: CCI Dimensions (passive-defensive, active-defensive, passive-offensive, active-offensive), CCI Functional Areas (detection, deterrence, deception, neutralisation), CCI Job Roles (associated with each respective Functional Area), and Tasks and Competences (allocated to each job role). Pivoting on prior research on CCI Dimensions and CCI Functional Areas, this paper advances a proposition on associated Job Roles in a manner that is both intelligible and categorised. To this end, the paper advances a five-step process that evaluates and examines Counterintelligence and Cybersecurity Job Roles and functions to derive a combination of new or existing Job Role
暂无评论