2018
DOI: 10.1088/1742-6596/1015/3/032088
|View full text |Cite
|
Sign up to set email alerts
|

Interval forecasting of cyberattack intensity on informatization objects of industry using probability cluster model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Cova, Chen, Chang, et al detected and analyzed "drive-by-download" on the web as a representative means of spreading malicious code [13,14,15,16]. In addition, Han found that the large-scale cyber terror attack in Korea and the cyber-attack against Sony Pictures were committed by the same attacker group through case-based reasoning [17,28,29]. Many activities are also conducted to share cyber-attack information in the standard aspect.…”
Section: Related Workmentioning
confidence: 99%
“…Cova, Chen, Chang, et al detected and analyzed "drive-by-download" on the web as a representative means of spreading malicious code [13,14,15,16]. In addition, Han found that the large-scale cyber terror attack in Korea and the cyber-attack against Sony Pictures were committed by the same attacker group through case-based reasoning [17,28,29]. Many activities are also conducted to share cyber-attack information in the standard aspect.…”
Section: Related Workmentioning
confidence: 99%