6   Artículos

 
en línea
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang    
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Manfred Sneps-Sneppe     Pág. 115 - 125
The confrontation of these two technologies - packet-switching and circuit-switching ? has a long history, and it seems to be incessant. It had started with Asynchronous Transfer Mode technology in the 1990s. The breakup of the Bell System marked a key l... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Alexander Kosenkov    
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its ele... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Boldizsár Bencsáth, Gábor Pék, Levente Buttyán and Márk Félegyházi    
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples we... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »