Results 121 to 130 of about 4,199 (192)

Data-Driven Network Analysis for Anomaly Traffic Detection. [PDF]

open access: yesSensors (Basel), 2023
Alam S, Alam Y, Cui S, Akujuobi C.
europepmc   +1 more source

Blackout in Spain: Urgent Analysis of Impact on Emergency Medical Services. [PDF]

open access: yesPrehosp Disaster Med
Castro-Delgado R   +5 more
europepmc   +1 more source

Counter cyberterrorism.

open access: yes, 2003
Is cyberterrorism a strategic concern or a myth? Hype and the 9//11 tragedy have led the matter to be securitised to such an extent as to stir up paranoia and panic, giving rise to illusions of a Digital Pearl Harbour. Cyberterrorism’s naysayers have dismissed such discourse by suggesting cyberterrosists do not wield a weapon of mass destruction, but a
openaire   +1 more source

Defining cyberterrorism

open access: yes, 2018
RESUMEN: El presente trabajo tiene por objeto definir el concepto de ciberterrorismo. Con dicha finalidad, la primera parte del artículo analiza la noción de terrorismo, género al que pertenece la especie «ciberterrorismo». La segunda parte del trabajo, en cambio, se dedica fundamentalmente a delimitar el término ciberterrorismo y a plantear los ...
openaire   +1 more source

Home - About - Disclaimer - Privacy