Modeling malicious activities in cyber space
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we...
Ausführliche Beschreibung
Autor*in: |
Yu, Shui [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
Transmission Control Protocol/Internet Protocol (Computer network protocol) |
---|
Übergeordnetes Werk: |
Enthalten in: IEEE network - New York, NY : IEEE, 1987, 29(2015), 6, Seite 83-87 |
---|---|
Übergeordnetes Werk: |
volume:29 ; year:2015 ; number:6 ; pages:83-87 |
Links: |
---|
DOI / URN: |
10.1109/MNET.2015.7340429 |
---|
Katalog-ID: |
OLC1957683481 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1957683481 | ||
003 | DE-627 | ||
005 | 20220216050115.0 | ||
007 | tu | ||
008 | 160206s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1109/MNET.2015.7340429 |2 doi | |
028 | 5 | 2 | |a PQ20160617 |
035 | |a (DE-627)OLC1957683481 | ||
035 | |a (DE-599)GBVOLC1957683481 | ||
035 | |a (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 | ||
035 | |a (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q DNB |
084 | |a 54.00 |2 bkl | ||
100 | 1 | |a Yu, Shui |e verfasserin |4 aut | |
245 | 1 | 0 | |a Modeling malicious activities in cyber space |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. | ||
650 | 4 | |a IP networks | |
650 | 4 | |a Biological system modeling | |
650 | 4 | |a Computer crime | |
650 | 4 | |a Complexity theory | |
650 | 4 | |a Internet | |
650 | 4 | |a Network topology | |
650 | 4 | |a Accuracy | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a Models | |
650 | 4 | |a Transmission Control Protocol/Internet Protocol (Computer network protocol) | |
650 | 4 | |a Research | |
650 | 4 | |a Network architecture | |
650 | 4 | |a Analysis | |
650 | 4 | |a Usage | |
700 | 1 | |a Wang, Guojun |4 oth | |
700 | 1 | |a Zhou, Wanlei |4 oth | |
773 | 0 | 8 | |i Enthalten in |t IEEE network |d New York, NY : IEEE, 1987 |g 29(2015), 6, Seite 83-87 |w (DE-627)130412368 |w (DE-600)622956-6 |w (DE-576)015915387 |x 0890-8044 |7 nnns |
773 | 1 | 8 | |g volume:29 |g year:2015 |g number:6 |g pages:83-87 |
856 | 4 | 1 | |u http://dx.doi.org/10.1109/MNET.2015.7340429 |3 Volltext |
856 | 4 | 2 | |u http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 |
856 | 4 | 2 | |u http://search.proquest.com/docview/1749606499 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_4311 | ||
936 | b | k | |a 54.00 |q AVZ |
951 | |a AR | ||
952 | |d 29 |j 2015 |e 6 |h 83-87 |
author_variant |
s y sy |
---|---|
matchkey_str |
article:08908044:2015----::oeigaiiuatvte |
hierarchy_sort_str |
2015 |
bklnumber |
54.00 |
publishDate |
2015 |
allfields |
10.1109/MNET.2015.7340429 doi PQ20160617 (DE-627)OLC1957683481 (DE-599)GBVOLC1957683481 (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace DE-627 ger DE-627 rakwb eng 004 DNB 54.00 bkl Yu, Shui verfasserin aut Modeling malicious activities in cyber space 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage Wang, Guojun oth Zhou, Wanlei oth Enthalten in IEEE network New York, NY : IEEE, 1987 29(2015), 6, Seite 83-87 (DE-627)130412368 (DE-600)622956-6 (DE-576)015915387 0890-8044 nnns volume:29 year:2015 number:6 pages:83-87 http://dx.doi.org/10.1109/MNET.2015.7340429 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 http://search.proquest.com/docview/1749606499 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2061 GBV_ILN_4311 54.00 AVZ AR 29 2015 6 83-87 |
spelling |
10.1109/MNET.2015.7340429 doi PQ20160617 (DE-627)OLC1957683481 (DE-599)GBVOLC1957683481 (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace DE-627 ger DE-627 rakwb eng 004 DNB 54.00 bkl Yu, Shui verfasserin aut Modeling malicious activities in cyber space 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage Wang, Guojun oth Zhou, Wanlei oth Enthalten in IEEE network New York, NY : IEEE, 1987 29(2015), 6, Seite 83-87 (DE-627)130412368 (DE-600)622956-6 (DE-576)015915387 0890-8044 nnns volume:29 year:2015 number:6 pages:83-87 http://dx.doi.org/10.1109/MNET.2015.7340429 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 http://search.proquest.com/docview/1749606499 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2061 GBV_ILN_4311 54.00 AVZ AR 29 2015 6 83-87 |
allfields_unstemmed |
10.1109/MNET.2015.7340429 doi PQ20160617 (DE-627)OLC1957683481 (DE-599)GBVOLC1957683481 (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace DE-627 ger DE-627 rakwb eng 004 DNB 54.00 bkl Yu, Shui verfasserin aut Modeling malicious activities in cyber space 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage Wang, Guojun oth Zhou, Wanlei oth Enthalten in IEEE network New York, NY : IEEE, 1987 29(2015), 6, Seite 83-87 (DE-627)130412368 (DE-600)622956-6 (DE-576)015915387 0890-8044 nnns volume:29 year:2015 number:6 pages:83-87 http://dx.doi.org/10.1109/MNET.2015.7340429 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 http://search.proquest.com/docview/1749606499 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2061 GBV_ILN_4311 54.00 AVZ AR 29 2015 6 83-87 |
allfieldsGer |
10.1109/MNET.2015.7340429 doi PQ20160617 (DE-627)OLC1957683481 (DE-599)GBVOLC1957683481 (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace DE-627 ger DE-627 rakwb eng 004 DNB 54.00 bkl Yu, Shui verfasserin aut Modeling malicious activities in cyber space 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage Wang, Guojun oth Zhou, Wanlei oth Enthalten in IEEE network New York, NY : IEEE, 1987 29(2015), 6, Seite 83-87 (DE-627)130412368 (DE-600)622956-6 (DE-576)015915387 0890-8044 nnns volume:29 year:2015 number:6 pages:83-87 http://dx.doi.org/10.1109/MNET.2015.7340429 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 http://search.proquest.com/docview/1749606499 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2061 GBV_ILN_4311 54.00 AVZ AR 29 2015 6 83-87 |
allfieldsSound |
10.1109/MNET.2015.7340429 doi PQ20160617 (DE-627)OLC1957683481 (DE-599)GBVOLC1957683481 (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace DE-627 ger DE-627 rakwb eng 004 DNB 54.00 bkl Yu, Shui verfasserin aut Modeling malicious activities in cyber space 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage Wang, Guojun oth Zhou, Wanlei oth Enthalten in IEEE network New York, NY : IEEE, 1987 29(2015), 6, Seite 83-87 (DE-627)130412368 (DE-600)622956-6 (DE-576)015915387 0890-8044 nnns volume:29 year:2015 number:6 pages:83-87 http://dx.doi.org/10.1109/MNET.2015.7340429 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 http://search.proquest.com/docview/1749606499 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2061 GBV_ILN_4311 54.00 AVZ AR 29 2015 6 83-87 |
language |
English |
source |
Enthalten in IEEE network 29(2015), 6, Seite 83-87 volume:29 year:2015 number:6 pages:83-87 |
sourceStr |
Enthalten in IEEE network 29(2015), 6, Seite 83-87 volume:29 year:2015 number:6 pages:83-87 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
IEEE network |
authorswithroles_txt_mv |
Yu, Shui @@aut@@ Wang, Guojun @@oth@@ Zhou, Wanlei @@oth@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
130412368 |
dewey-sort |
14 |
id |
OLC1957683481 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1957683481</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216050115.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/MNET.2015.7340429</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1957683481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1957683481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DNB</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yu, Shui</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modeling malicious activities in cyber space</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IP networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biological system modeling</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Complexity theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network topology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Accuracy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Models</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission Control Protocol/Internet Protocol (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Usage</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Guojun</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Wanlei</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">IEEE network</subfield><subfield code="d">New York, NY : IEEE, 1987</subfield><subfield code="g">29(2015), 6, Seite 83-87</subfield><subfield code="w">(DE-627)130412368</subfield><subfield code="w">(DE-600)622956-6</subfield><subfield code="w">(DE-576)015915387</subfield><subfield code="x">0890-8044</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:29</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:83-87</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/MNET.2015.7340429</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1749606499</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4311</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">29</subfield><subfield code="j">2015</subfield><subfield code="e">6</subfield><subfield code="h">83-87</subfield></datafield></record></collection>
|
author |
Yu, Shui |
spellingShingle |
Yu, Shui ddc 004 bkl 54.00 misc IP networks misc Biological system modeling misc Computer crime misc Complexity theory misc Internet misc Network topology misc Accuracy misc Computer architecture misc Models misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Research misc Network architecture misc Analysis misc Usage Modeling malicious activities in cyber space |
authorStr |
Yu, Shui |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)130412368 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0890-8044 |
topic_title |
004 DNB 54.00 bkl Modeling malicious activities in cyber space IP networks Biological system modeling Computer crime Complexity theory Internet Network topology Accuracy Computer architecture Models Transmission Control Protocol/Internet Protocol (Computer network protocol) Research Network architecture Analysis Usage |
topic |
ddc 004 bkl 54.00 misc IP networks misc Biological system modeling misc Computer crime misc Complexity theory misc Internet misc Network topology misc Accuracy misc Computer architecture misc Models misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Research misc Network architecture misc Analysis misc Usage |
topic_unstemmed |
ddc 004 bkl 54.00 misc IP networks misc Biological system modeling misc Computer crime misc Complexity theory misc Internet misc Network topology misc Accuracy misc Computer architecture misc Models misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Research misc Network architecture misc Analysis misc Usage |
topic_browse |
ddc 004 bkl 54.00 misc IP networks misc Biological system modeling misc Computer crime misc Complexity theory misc Internet misc Network topology misc Accuracy misc Computer architecture misc Models misc Transmission Control Protocol/Internet Protocol (Computer network protocol) misc Research misc Network architecture misc Analysis misc Usage |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
g w gw w z wz |
hierarchy_parent_title |
IEEE network |
hierarchy_parent_id |
130412368 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
IEEE network |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)130412368 (DE-600)622956-6 (DE-576)015915387 |
title |
Modeling malicious activities in cyber space |
ctrlnum |
(DE-627)OLC1957683481 (DE-599)GBVOLC1957683481 (PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0 (KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace |
title_full |
Modeling malicious activities in cyber space |
author_sort |
Yu, Shui |
journal |
IEEE network |
journalStr |
IEEE network |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
83 |
author_browse |
Yu, Shui |
container_volume |
29 |
class |
004 DNB 54.00 bkl |
format_se |
Aufsätze |
author-letter |
Yu, Shui |
doi_str_mv |
10.1109/MNET.2015.7340429 |
dewey-full |
004 |
title_sort |
modeling malicious activities in cyber space |
title_auth |
Modeling malicious activities in cyber space |
abstract |
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. |
abstractGer |
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. |
abstract_unstemmed |
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2061 GBV_ILN_4311 |
container_issue |
6 |
title_short |
Modeling malicious activities in cyber space |
url |
http://dx.doi.org/10.1109/MNET.2015.7340429 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429 http://search.proquest.com/docview/1749606499 |
remote_bool |
false |
author2 |
Wang, Guojun Zhou, Wanlei |
author2Str |
Wang, Guojun Zhou, Wanlei |
ppnlink |
130412368 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth |
doi_str |
10.1109/MNET.2015.7340429 |
up_date |
2024-07-04T01:03:29.959Z |
_version_ |
1803608402123816960 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1957683481</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216050115.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/MNET.2015.7340429</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1957683481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1957683481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c1874-d5380eb5c92a3e321b8455fd158889a13bc7ad189cf9ee7f6b6c2d35fb7f790f0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0159296320150000029000600083modelingmaliciousactivitiesincyberspace</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DNB</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yu, Shui</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modeling malicious activities in cyber space</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IP networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biological system modeling</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Complexity theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network topology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Accuracy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Models</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission Control Protocol/Internet Protocol (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Usage</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Guojun</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Wanlei</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">IEEE network</subfield><subfield code="d">New York, NY : IEEE, 1987</subfield><subfield code="g">29(2015), 6, Seite 83-87</subfield><subfield code="w">(DE-627)130412368</subfield><subfield code="w">(DE-600)622956-6</subfield><subfield code="w">(DE-576)015915387</subfield><subfield code="x">0890-8044</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:29</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:83-87</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/MNET.2015.7340429</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7340429</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1749606499</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4311</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">29</subfield><subfield code="j">2015</subfield><subfield code="e">6</subfield><subfield code="h">83-87</subfield></datafield></record></collection>
|
score |
7.402815 |