Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

I Cyber Power
1 Developing Political Response Framework to Cyber Hostilities
2 The modern strategies in the cyber warfare
3 Cyber Security Strategy Implementation Architecture in a Value System
4 Jedis and Starmen
Cyber in the Service of the Light Side of the Force
5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere
II Cyber in the Service of the Light Side of the Force
6 Real-time application-layer DDoS attacks detection in encrypted traffic
7 Domain Generation Algorithms (DGA) detection using machine learning methods
8 Tailorable Representation of Security Control Catalog on Semantic Wiki
9 Password Cracking
10 Game Console attacking
11 OS Attacks
12 Honeypot utilization for network intrusion detection
13 Testing framework for intrusion detection systems in encrypted traffic
14 Security Challenges of IoT-based Smart Home Appliances.

Browse Subjects

Show more subjects...

Statistics

from
to
Export