Telecom links provide cyber-attack route

被引:0
|
作者
Fulghum, DA
机构
来源
AVIATION WEEK & SPACE TECHNOLOGY | 1999年 / 151卷 / 19期
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
引用
收藏
页码:81 / 83
页数:3
相关论文
共 50 条
  • [41] The Enemy Within: The Challenge for Business from Cyber-attack
    Reynolds, Michael
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 123 - 136
  • [42] Gaussian process learning for cyber-attack early warning
    Zhang J.
    Porras P.
    Ullrich J.
    Statistical Analysis and Data Mining, 2010, 3 (01): : 56 - 68
  • [43] Are miserly budgets putting businesses at risk of cyber-attack?
    Brown T.
    Computer Fraud and Security, 2018, 2018 (08): : 9 - 11
  • [44] Improving Cyber-Attack Predictions Through Information Foraging
    Dalton, Adam
    Dorr, Bonnie
    Liang, Leon
    Hollingshead, Kristy
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4642 - 4647
  • [45] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [46] Deep learning for predictive alerting and cyber-attack mitigation
    Imeri, Arbnor
    Rysavy, Ondrej
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 476 - 481
  • [47] Estimating Loss Due to Cyber-attack in the Presence of Uncertainty
    Nguyen, Hoang Hai
    Nicol, David M.
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 361 - 369
  • [48] Cyber-Attack for BGP Systems Using CoPNet Model
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 10 - 15
  • [49] The Research on Cyber-Attack Testbed With Hardware-In-Loop
    Fei, Jiaxuan
    Liu, Zengji
    Ma, Yuanyuan
    Huang, Xiuli
    Wang, Qi
    Tang, Yi
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [50] Generation Z: Cyber-Attack Awareness Training Effectiveness
    White, Garry
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (03) : 560 - 571