Results 151 to 160 of about 4,651 (188)

Cyberattacks

Proceedings of the 7th conference on Information technology education, 2006
This paper describes a lab-based course in computer security targeted at non-majors and introductory-level students at a liberal arts college. The course material exposes students to actual malware and hacking attacks through experiments in an isolated computer lab.
openaire   +1 more source

Deterring Strategic Cyberattack

IEEE Security & Privacy Magazine, 2011
Protecting critical infrastructure from cyberattacks by other nations is a matter of considerable concern. Can deterrence play a role in such protection? Can lessons from nuclear deterrence-the most elaborated and successful version of deterrence-be adapted to the cyber case?
openaire   +1 more source

On cyberattack mechanisms

International Journal of Web and Grid Services, 2013
Cybercrimes and cyberattacks have become serious threats to the internet-based life and work of people and organisations. Cyberdefenders and law enforcement have been waging a losing war against the determined and clever cybercriminals and cyberwarriors. The primary elements of cyberattack include hacking, malware, and DDoS attacks. This paper provides
Jae Hyuk Choi   +4 more
openaire   +1 more source

Economically Complex Cyberattacks

IEEE Security and Privacy Magazine, 2005
Most people working in cyber security recognize that the interconnections and complexities of our economy can have a huge effect on the destructiveness of cyber attacks. They refer casually to "network effects," "spillover effects" or "knock-on effects." Yet there is little understanding of how such effects actually work, what conditions are necessary ...
openaire   +1 more source

Cyberattack Classificator Verification

2017
Cyber security is an integral part of security system of any advanced country. Given the fact that the number of cyber attacks constantly increase with concurrent increase of their technological complexity, the paper proposes a new classifier structure to speed up detection of unauthorized interference while maintaining the established accuracy ...
Igor Korobiichuk   +4 more
openaire   +1 more source

CyberAttacks and robotics

2023 31st National Conference with International Participation (TELECOM), 2023
Grozdan Hristov   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy