Cyber-attack

Results: 386



#Item
12016 IEEE International Conference on Software Science, Technology and Engineering  Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis  Ariel Bar, Bracha Shapi

2016 IEEE International Conference on Software Science, Technology and Engineering Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis Ariel Bar, Bracha Shapi

Add to Reading List

Source URL: cyber.bgu.ac.il

Language: English - Date: 2017-10-26 13:42:18
    2Phillips Solicitors reinforces Cyber Attack Protection with Security Awareness Training and Testing Phillips Solicitors has been in the heart of Basingstoke since 1986, working towards achieving the best

    Phillips Solicitors reinforces Cyber Attack Protection with Security Awareness Training and Testing Phillips Solicitors has been in the heart of Basingstoke since 1986, working towards achieving the best

    Add to Reading List

    Source URL: www.infosec-cloud.com

    Language: English - Date: 2018-03-05 11:21:43
      3Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

      Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

      Add to Reading List

      Source URL: faculty.nps.edu

      Language: English - Date: 2018-03-15 16:39:23
        4October 2017 Edition  International Laws on Cyber attacks that Do Not Constitute an Armed Attack Keiko KONO Senior Research Fellow, Government and Law Division,

        October 2017 Edition International Laws on Cyber attacks that Do Not Constitute an Armed Attack Keiko KONO Senior Research Fellow, Government and Law Division,

        Add to Reading List

        Source URL: www.nids.mod.go.jp

        Language: English - Date: 2018-03-28 01:28:35
          5ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

          ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

          Add to Reading List

          Source URL: ccl.northwestern.edu

          Language: English - Date: 2018-05-15 12:56:11
            6MUSE™  MANAGED CYBER SECURITY INNOVATION PINPOINT THREAT DETECTION REAL-TIME ATTACK MITIGATION

            MUSE™ MANAGED CYBER SECURITY INNOVATION PINPOINT THREAT DETECTION REAL-TIME ATTACK MITIGATION

            Add to Reading List

            Source URL: www.ecitele.com

            - Date: 2018-01-02 03:42:11
              76 Considerations When Buying Cyber Insurance In today’s interconnected world, it seems that no organization is immune from experiencing a cyber attack. In fact, there is a saying in the cyber security community that th

              6 Considerations When Buying Cyber Insurance In today’s interconnected world, it seems that no organization is immune from experiencing a cyber attack. In fact, there is a saying in the cyber security community that th

              Add to Reading List

              Source URL: krginsure.com

              - Date: 2017-05-30 04:27:30
                8training.keywcorp.com  This two-week course teaches students current cyber attack methods in order to develop business strategies to protect and defend their networks and critical information. Classroom discussion and ex

                training.keywcorp.com This two-week course teaches students current cyber attack methods in order to develop business strategies to protect and defend their networks and critical information. Classroom discussion and ex

                Add to Reading List

                Source URL: training.keywcorp.com

                - Date: 2016-06-28 22:20:29
                  9GE Oil & Gas  Cyber Security Solutions for Industrial Controls  OVERVIEW

                  GE Oil & Gas Cyber Security Solutions for Industrial Controls OVERVIEW

                  Add to Reading List

                  Source URL: www.geoilandgas.com

                  Language: English - Date: 2016-08-09 11:53:34
                  10Blade Risk Manager Automated Risk Assessment The cyber threats facing cyber systems demands a solution capable of understanding their enormity and complexity, visualizing attack options, assessing vulnerabilities and fac

                  Blade Risk Manager Automated Risk Assessment The cyber threats facing cyber systems demands a solution capable of understanding their enormity and complexity, visualizing attack options, assessing vulnerabilities and fac

                  Add to Reading List

                  Source URL: www.kdmanalytics.com

                  Language: English - Date: 2015-03-10 10:01:35