Modeling malicious activities in cyber space

Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we...
Ausführliche Beschreibung

Gespeichert in:
Autor*in:

Yu, Shui [verfasserIn]

Wang, Guojun

Zhou, Wanlei

Format:

Artikel

Sprache:

Englisch

Erschienen:

2015

Schlagwörter:

IP networks

Biological system modeling

Computer crime

Complexity theory

Internet

Network topology

Accuracy

Computer architecture

Models

Transmission Control Protocol/Internet Protocol (Computer network protocol)

Research

Network architecture

Analysis

Usage

Übergeordnetes Werk:

Enthalten in: IEEE network - New York, NY : IEEE, 1987, 29(2015), 6, Seite 83-87

Übergeordnetes Werk:

volume:29 ; year:2015 ; number:6 ; pages:83-87

Links:

Volltext
Link aufrufen
Link aufrufen

DOI / URN:

10.1109/MNET.2015.7340429

Katalog-ID:

OLC1957683481

Nicht das Richtige dabei?

Schreiben Sie uns!