[PDF][PDF] A taxonomy of the cyber attacks

PK Boyanov - Journal Scientific & Applied Research, 2013 - academia.edu
In this paper is made a sophisticated taxonomy of the malicious cyber attacks. The cyber
attacks are summarized into several mainly types with additional subtypes for everyone …

Ağ Sistemlerinin Güvenliği İçin Siber Saldırıların Ayrık Olaylı Sistem Tanımlama Tabanlı Modellenmesi ve Simülasyonu

Ş Kara, A Zengin, S Hızal - Mühendislik Bilimleri ve Araştırmaları …, 2023 - dergipark.org.tr
The rapid progress in information and network technologies has made these technologies
indispensable tools both for individuals and in all areas of corporate functioning. This …

Leveraging cyber-physical system honeypots to enhance threat intelligence

M Haney - Critical Infrastructure Protection XIII: 13th IFIP WG …, 2019 - Springer
Honeypots and related deception technologies have long been used to capture and study
malicious activity in networks. However, clear requirements for developing effective …