Telecom links provide cyber-attack route

被引:0
|
作者
Fulghum, DA
机构
来源
AVIATION WEEK & SPACE TECHNOLOGY | 1999年 / 151卷 / 19期
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
引用
收藏
页码:81 / 83
页数:3
相关论文
共 50 条
  • [21] Studying The Impacts of Cyber-attack On Smart Grid
    Meraj, Tanzim
    Sharmin, Shaela
    Mahmud, Asif
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2015, : 461 - 466
  • [22] Predictive model for multistage cyber-attack simulation
    Ravdeep Kour
    Adithya Thaduri
    Ramin Karim
    International Journal of System Assurance Engineering and Management, 2020, 11 : 600 - 613
  • [23] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 203 - 210
  • [24] A systematic classification scheme for cyber-attack taxonomy
    Kim, S.
    Shin, J.
    Heo, G.
    Song, J. G.
    SAFETY AND RELIABILITY - SAFE SOCIETIES IN A CHANGING WORLD, 2018, : 3013 - 3019
  • [25] Impact of Cyber-Attack on Isolated Power System
    Sahabuddin, Md.
    Dutta, Bilash
    Hassan, Mehedi
    2016 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT), 2016,
  • [26] Labour calls for inquiry into NHS cyber-attack
    O'Dowd, Adrian
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 357
  • [27] Infrastructure Cyber-Attack Awareness Training: Effective or Not?
    White, Garry L.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [28] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [29] Cyber-Attack as a Menace to Effective Governance in Nigeria
    Fayomi, Oluyemi
    Ndubisi, Oly Nelson
    Ayo, Charles
    Chidozie, Felix
    Ajayi, Lady
    Okorie, Uchechukwu
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON EGOVERNMENT, 2015, : 107 - 116
  • [30] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678