JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
Since the 1980s, we have observed a range of cyberattacks targeting Industrial Control Systems (ICS), some of which have impacted elements of critical national infrastructure …
B Miller, D Rowe - Proceedings of the 1st Annual conference on …, 2012 - dl.acm.org
In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of …
The previous chapters explored cybercriminal activities associated with computer intrusion and manipulation, which are generally labelled as hacking. This chapter critically explores …
Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by …
The coincidence be-tween the evolving changes of globalization, the inherent weaknesses of the Arab region, and the inadequate American response to both ensures that ter-rorism …
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective. It presents clear …
Global Terrorism, 4th edition continues to provide students with the most comprehensive introduction to terrorism as a global phenomenon. It introduces students to history, politics …