2019
DOI: 10.1088/1757-899x/481/1/012003
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattack intensity forecasting on informatization objects of critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Cova, Chen, Chang, et al detected and analyzed "drive-by-download" on the web as a representative means of spreading malicious code [13,14,15,16]. In addition, Han found that the large-scale cyber terror attack in Korea and the cyber-attack against Sony Pictures were committed by the same attacker group through case-based reasoning [17,28,29]. Many activities are also conducted to share cyber-attack information in the standard aspect.…”
Section: Related Workmentioning
confidence: 99%
“…Cova, Chen, Chang, et al detected and analyzed "drive-by-download" on the web as a representative means of spreading malicious code [13,14,15,16]. In addition, Han found that the large-scale cyber terror attack in Korea and the cyber-attack against Sony Pictures were committed by the same attacker group through case-based reasoning [17,28,29]. Many activities are also conducted to share cyber-attack information in the standard aspect.…”
Section: Related Workmentioning
confidence: 99%
“…Knowledge is not stored in the heads of experienced employees, but belongs to the industry, is accumulated and transmitted. On top of that, time resources for all manner of explanations and training of employees are reduced [6,7].…”
mentioning
confidence: 99%