• Citations Per Year
Learn More
As organizations become ever more dependent on networked operations, they are increasingly vulnerable to attack by a variety of attackers, including criminals, terrorists and nation states using cyber attacks. New malware attacks, including viruses, Trojans, and worms, are constantly and rapidly emerging threats. However, attackers often reuse code and(More)
The Escher model relies on a mix of government and industry funding to identify cross-industry needs and select technologies for maturation and transitioning. The Escher organization serves as a thin layer of management to join end users and the research community in setting standards, directing users to available sites, using uniform community-established(More)
1948 under the Act of March 3, 1879. Acceptance for mailIng at the special rate postage provided for in the Act of February 28, 1925, embodied in paragraph 4, Sec. 538, P. L. and R., authorized January 13, 1948. Articles offered for publication should be sent to the Editor. The AAAS assumes no responsibility for the opinions expressed by contributors.(More)