Linked e-resources
Details
Table of Contents
I Cyber Power
1 Developing Political Response Framework to Cyber Hostilities
2 The modern strategies in the cyber warfare
3 Cyber Security Strategy Implementation Architecture in a Value System
4 Jedis and Starmen
Cyber in the Service of the Light Side of the Force
5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere
II Cyber in the Service of the Light Side of the Force
6 Real-time application-layer DDoS attacks detection in encrypted traffic
7 Domain Generation Algorithms (DGA) detection using machine learning methods
8 Tailorable Representation of Security Control Catalog on Semantic Wiki
9 Password Cracking
10 Game Console attacking
11 OS Attacks
12 Honeypot utilization for network intrusion detection
13 Testing framework for intrusion detection systems in encrypted traffic
14 Security Challenges of IoT-based Smart Home Appliances.
1 Developing Political Response Framework to Cyber Hostilities
2 The modern strategies in the cyber warfare
3 Cyber Security Strategy Implementation Architecture in a Value System
4 Jedis and Starmen
Cyber in the Service of the Light Side of the Force
5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere
II Cyber in the Service of the Light Side of the Force
6 Real-time application-layer DDoS attacks detection in encrypted traffic
7 Domain Generation Algorithms (DGA) detection using machine learning methods
8 Tailorable Representation of Security Control Catalog on Semantic Wiki
9 Password Cracking
10 Game Console attacking
11 OS Attacks
12 Honeypot utilization for network intrusion detection
13 Testing framework for intrusion detection systems in encrypted traffic
14 Security Challenges of IoT-based Smart Home Appliances.