|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Manfred Sneps-Sneppe
Pág. 115 - 125
The confrontation of these two technologies - packet-switching and circuit-switching ? has a long history, and it seems to be incessant. It had started with Asynchronous Transfer Mode technology in the 1990s. The breakup of the Bell System marked a key l...
ver más
|
|
|
|
|
|
|
Alexander Kosenkov
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its ele...
ver más
|
|
|
|
|
|
|
Boldizsár Bencsáth, Gábor Pék, Levente Buttyán and Márk Félegyházi
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples we...
ver más
|
|
|
|