<--- Back to Details
First PageDocument Content
Cybercrime / Computer security / Cyberwarfare / Security engineering / Computer network security / Cyberspace / National security / Denial-of-service attack / Cyberattack / Network security
Date: 2014-09-02 00:52:00
Cybercrime
Computer security
Cyberwarfare
Security engineering
Computer network security
Cyberspace
National security
Denial-of-service attack
Cyberattack
Network security

CALL FOR PAPERS Special Issue of the International Journal on Network Management (IJNM) on Measure, Detect and Mitigate – Challenges and Trends in Network Security Publication: September 2015

Add to Reading List

Source URL: www.caida.org

Download Document from Source Website

File Size: 71,72 KB

Share Document on Facebook

Similar Documents

Is there a Place in Cyberspace: The Uses and Users of Public Internet Terminals1 Jeffrey Boase, Wenhong Chen, Barry Wellman, and Monica Prijatelj NetLab, Centre for Urban & Community Studies, University of Toronto This p

Is there a Place in Cyberspace: The Uses and Users of Public Internet Terminals1 Jeffrey Boase, Wenhong Chen, Barry Wellman, and Monica Prijatelj NetLab, Centre for Urban & Community Studies, University of Toronto This p

DocID: 1xUn3 - View Document

2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), and 2015 IEEE 12th International Conf on Emb

2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), and 2015 IEEE 12th International Conf on Emb

DocID: 1vqe7 - View Document

Cyberspace Law (Law 793) Final Exam

Cyberspace Law (Law 793) Final Exam

DocID: 1vo9w - View Document

Fall 2008 Cyberspace Law Syllabus

Fall 2008 Cyberspace Law Syllabus

DocID: 1vkyW - View Document

Research Project AmSt 507 Ethics of US CyberWarfare Research Questions: The newest battlefield on planet Earth is in cyberspace. How does this change the rules of international warfare? Territo

DocID: 1vdUx - View Document