Cyber-attack

Results: 386



#Item
91Problem solving / Vulnerability / Nash equilibrium / Zero-day attack / Social vulnerability / Extensive-form game / United States Cyber Command / Sequential equilibrium / Solution concept / Game theory / Cyberwarfare / Computer security

Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems [Position Paper] Tyler Moore, Allan Friedman and Ariel D. Procaccia Center for Research on Computation & Soci

Add to Reading List

Source URL: www.nspw.org

Language: English - Date: 2011-04-20 15:15:37
92Computer security / Electronic warfare / Computer network operations / Hacking / Military technology / CNO / Threat / Attack / Cyber Operations / Computer network security / Cyberwarfare / Security

Microsoft Word - 05Sep_Patterson_Smith.doc

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:34
93Cyberwarfare / Computer security / Computer network security / Military technology / Critical infrastructure protection / Phishing / Threat / International Multilateral Partnership Against Cyber Threats / Attack / Cybercrime / Computer crimes / Security

GAO-15-573T, CYBERSECURITY: Actions Needed to Address Challenges Facing Federal Systems

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-04-22 14:44:00
94Denial-of-service attack / Internet Relay Chat / National Police Agency / Cyberspace / Cyberwarfare / Denial-of-service attacks / Computer network security

Check your zombie devices! Analysis of the DDoS cyber terrorism against the country and future attacks on various devices DongJoo Ha, SangMyung Choi, TaeHyung Kim, SeungYoun Han Hauri & Issuemakerslab

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:37
95Cybercrime / Malware / Attack / Botnet / Computer worm / Vulnerability / Computer crime / Shadowserver / Computer network security / Cyberwarfare / Computer security

European Cyber-Security Research and Innovation by Federico Maggi, Stefano Zanero, and Evangelos Markatos Looking back at the evolution of cyber criminal activities, from the nineties to the present day, we

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-22 10:52:19
96Data security / Crime prevention / National security / Hacking / Network security / Information security management system / Information security / Vulnerability / Attack / Security / Computer security / Cyberwarfare

NATIONAL CYBER SECURITY EXERCISE 2011 FINAL REPORT ISBN: January 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-05-08 16:05:54
97Alert correlation / Graph isomorphism / Graph / Degree / Subgraph isomorphism problem / Graph theory / Mathematics / Theoretical computer science

Learning Attack Strategies from Intrusion Alerts∗ Peng Ning and Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:01
98Anthem / Health maintenance organization / WellPoint / Cyberwarfare / Blue Cross Blue Shield Association / Phishing / Healthcare in the United States / Cybercrime / Health

Update on Anthem Cyber Attack — General Information for Clients and Brokers What happened? What information has been compromised?

Add to Reading List

Source URL: in.gov

Language: English - Date: 2015-02-12 12:03:03
99Alert correlation

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
    100Computer network security / Crime prevention / National security / Software testing / Vulnerability / Cyber-physical system / SCADA / Attack / Social vulnerability / Security / Cyberwarfare / Computer security

    Security of Cyber-Physical Systems IEEE NTIS 2012 at Boeing Stefano Zanero, PhD Politecnico di Milano, Italy

    Add to Reading List

    Source URL: www.syssec-project.eu

    Language: English - Date: 2012-09-01 13:46:11
    UPDATE