Results 101 to 110 of about 4,651 (188)

Brandishing Cyberattack Capabilities

open access: yes, 2013
Deterrence is possible only when others have at least a good idea of possible U.S. military reprisals, but cyberattack capabilities resist such demonstration. This report explores ways they can be and under what circumstances, then goes on to examine the difficulties and the drawbacks.
openaire   +1 more source

Neural Network Method of Analysing Sensor Data to Prevent Illegal Cyberattacks. [PDF]

open access: yesSensors (Basel)
Vladov S   +5 more
europepmc   +1 more source

Enhancing cyberattack resiliency through the radiotherapy backup and recovery dashboard tool. [PDF]

open access: yesJ Appl Clin Med Phys
Pijanowski J   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy