Results 181 to 190 of about 14,082 (218)
Simulating the overload of medical processes due to system failures during a cyberattack. [PDF]
Willing M +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 7th conference on Information technology education, 2006
This paper describes a lab-based course in computer security targeted at non-majors and introductory-level students at a liberal arts college. The course material exposes students to actual malware and hacking attacks through experiments in an isolated computer lab.
openaire +1 more source
This paper describes a lab-based course in computer security targeted at non-majors and introductory-level students at a liberal arts college. The course material exposes students to actual malware and hacking attacks through experiments in an isolated computer lab.
openaire +1 more source
Deterring Strategic Cyberattack
IEEE Security & Privacy Magazine, 2011Protecting critical infrastructure from cyberattacks by other nations is a matter of considerable concern. Can deterrence play a role in such protection? Can lessons from nuclear deterrence-the most elaborated and successful version of deterrence-be adapted to the cyber case?
openaire +1 more source
International Journal of Web and Grid Services, 2013
Cybercrimes and cyberattacks have become serious threats to the internet-based life and work of people and organisations. Cyberdefenders and law enforcement have been waging a losing war against the determined and clever cybercriminals and cyberwarriors. The primary elements of cyberattack include hacking, malware, and DDoS attacks. This paper provides
Jae Hyuk Choi +4 more
openaire +1 more source
Cybercrimes and cyberattacks have become serious threats to the internet-based life and work of people and organisations. Cyberdefenders and law enforcement have been waging a losing war against the determined and clever cybercriminals and cyberwarriors. The primary elements of cyberattack include hacking, malware, and DDoS attacks. This paper provides
Jae Hyuk Choi +4 more
openaire +1 more source
Economically Complex Cyberattacks
IEEE Security and Privacy Magazine, 2005Most people working in cyber security recognize that the interconnections and complexities of our economy can have a huge effect on the destructiveness of cyber attacks. They refer casually to "network effects," "spillover effects" or "knock-on effects." Yet there is little understanding of how such effects actually work, what conditions are necessary ...
openaire +1 more source
Cyberattack Classificator Verification
2017Cyber security is an integral part of security system of any advanced country. Given the fact that the number of cyber attacks constantly increase with concurrent increase of their technological complexity, the paper proposes a new classifier structure to speed up detection of unauthorized interference while maintaining the established accuracy ...
Igor Korobiichuk +4 more
openaire +1 more source
2023 31st National Conference with International Participation (TELECOM), 2023
Grozdan Hristov +2 more
openaire +1 more source
Grozdan Hristov +2 more
openaire +1 more source

