熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 9 筆, 頁數 1 / 1
呈現:
Securing U.S. Elections: A Method for Prioritizing Cybersecurity Risk in Election Infrastructure
Diversity of U.S. election systems means that developing a national picture of cybersecurity risk is... more |
|||
Cyber Mission Thread Analysis: A Prototype Framework for Assessing Impact to Missions from Cyber Attacks to Weapon Systems
An important consideration when deciding to mitigate or accept a risk from a cyber attack to a weapo... more |
|||
Countering Violent Extremism in Indonesia: Using an Online Panel Survey to Assess a Social Media Counter-Messaging Campaign
This report presents the results of an evaluation designed to assess the effects of countering viole... more |
|||
Robust and Resilient Logistics Operations in a Degraded Information Environment
The U.S. Air Force asked RAND Project AIR FORCE to determine where it is most fruitful to focus effo... more |
|||
Operationalizing U.S. Air Force Information Warfare
Information warfare (IW) and analogous terms of art are not new to the U.S. military’s vocabulary or... more |
|||
Countering Russian Social Media Influence
The Russian government’s campaigns of disinformation--political, social, religious, or otherwise--ha... more |
|||
Russian Social Media Influence: Understanding Russian Propaganda in Eastern Europe
Russia employs a sophisticated social media campaign against former Soviet states that includes news... more |
|||
Examining Isis Support and Opposition Networks on Twitter
This report examines the ongoing debate about the Islamic State in Iraq and Syria (ISIS) on Arabic T... more |
|||
Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles
There is increasing concern that Air Force systems containing information technology are vulnerable ... more |