Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2013
DOI: 10.1145/2492517.2500321
|View full text |Cite
|
Sign up to set email alerts
|

eWar - reality of future wars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Malware is also used to infect computers which take part in DDoS attacks [15]. This has occurred in the past with the Conficker worm which created a botnet of around six million zombies, used to launch DDoS attacks on organisations [16].…”
Section: Malwarementioning
confidence: 99%
See 3 more Smart Citations
“…Malware is also used to infect computers which take part in DDoS attacks [15]. This has occurred in the past with the Conficker worm which created a botnet of around six million zombies, used to launch DDoS attacks on organisations [16].…”
Section: Malwarementioning
confidence: 99%
“…Distributed Denial of Service is an attack which uses a group of infected computers (also known as a botnet) to take down a website by flooding it with unnecessary traffic [15]. Many countries have been hit by DDoS attacks which have negatively affected their economy.…”
Section: Distributed Denial Of Servicementioning
confidence: 99%
See 2 more Smart Citations