In recent years, the combination of deep reinforcement learning and unmanned aerial vehicle (UAV) to achieve autonomous flight has been a hot research field. In this paper, an obstacle avoidance navigation algorithm (...
详细信息
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute an...
详细信息
ISBN:
(纸本)9781914587702
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute and innovative in their techniques and operations globally. These intensifying cyber risks and incidents suggest that cyber capability is inversely proportional to cyber risks, threats and attacks. Therefore, this confirms an emergent and critical need to adopt and invest in intelligence strategies, predominantly cyber counterintelligence (CCI), which is a multi-disciplinary and proactive measure to mitigate risks and counter cyber threats and cyber-Attacks. Concurrent with the adoption of CCI is an appreciation that requisite job roles must be defined and developed. Notwithstanding the traction that CCI is gaining, we found no work on a clear categorisation for the CCI job roles in the academic or industry literature surveyed. Furthermore, from a cybersecurity perspective, it is unclear which job roles constitute the CCI field. This paper stems from and expands on the authors prior research on developing a CCI Competence Framework. The proposed CCI Competence Framework consists of four critical elements deemed essential for CCI workforce development. In order of progression, the Framework s elements are: CCI Dimensions (passive-defensive, active-defensive, passive-offensive, active-offensive), CCI Functional Areas (detection, deterrence, deception, neutralisation), CCI Job Roles (associated with each respective Functional Area), and Tasks and Competences (allocated to each job role). Pivoting on prior research on CCI Dimensions and CCI Functional Areas, this paper advances a proposition on associated Job Roles in a manner that is both intelligible and categorised. To this end, the paper advances a five-step process that evaluates and examines Counterintelligence and Cybersecurity Job Roles and functions to derive a combination of new or existing Job Role
Fashion complementary recommendation has always been crucial in the field of recommendation. In previous work, researchers did not pay attention to the connection and combinability between multi-dimensional image feat...
详细信息
In recent years, with the continuous development of deep learning, more and more network models have been proposed to solve practical problems. However, most models often need a large number of labeled samples to trai...
详细信息
The memory dirty page prediction technology can effectively predict whether a memory page will be modified (dirty) at the next moment, and is widely used in virtual machine migration, container migration and other fie...
详细信息
Knowledge distillation (KD) aims to distill the knowledge from a more extensive deep neural network into a small net-work without losing validity. This paper proposes a novel approach with active exploration and passi...
详细信息
The integration of the contrastive learning paradigm into deep clustering has led to enhanced performance in image clustering. However, in existing researches, the samples in the class of the target may be still treat...
详细信息
The field of sequential recommendation plays a crucial role in personalized recommendation systems, aiming to model users' past interactions and predict their future interactions with items or behaviors. Tradition...
详细信息
Smart metering systems (SMS) are popular in industrial and residential areas but can risk privacy by revealing user behaviors. Homomorphic encryption (HE) is a technique that protects data privacy by enabling calculat...
详细信息
Seismic deconvolution encounters problems of multiplicity and instability. The regularization technique based on various prior knowledge is used to constrain the range of solutions and improve the stability of deconvo...
详细信息
暂无评论