Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for cyberattacks

Warning: file_put_contents(cache/omni_49679cc80136123778ca58fc0b5c6c13.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Cyber-Attacks (Asset-Freezing) Regulations 2019
Open Library

Cyber-Attacks (Asset-Freezing) Regulations 2019

By Great Britain

First published in 2019...

View Book →
Cover of Protecting Critical Infrastructures Against Cyber-Attack
Open Library

Protecting Critical Infrastructures Against Cyber-Attack

By Stephen Lukasik

First published in 2017...

View Book →
Cover of DTIC AD1038105: Modeling Cyber Physical War Gaming
Internet Archive

DTIC AD1038105: Modeling Cyber Physical War Gaming

By Defense Technical Information Center

War games are simulations of what could happen in the real world. War games can serve multiple functions, such as training, testing a new system, testing existing processes, or discovering new knowled...

View Book →
Cover of Human Factors Analysis of 23 Cyberattacks
Open Library

Human Factors Analysis of 23 Cyberattacks

By Abbas Moallem

First published in 2025...

View Book →
Cover of DTIC ADA394215: Information Security: Weaknesses Place Commerce Data and Operations at Serious Risk
Internet Archive

DTIC ADA394215: Information Security: Weaknesses Place Commerce Data and Operations at Serious Risk

By Defense Technical Information Center

The Department of Commerce generates and disseminates some of the nation's most important economic information that is of paramount interest to U.S. businesses, policy makers, and researchers. Because...

View Book →
Cover of Cyber-Attacks and the Exploitable Imperfections of International Law
Open Library

Cyber-Attacks and the Exploitable Imperfections of International Law

By Yaroslav Radziwill

First published in 2015...

View Book →
Cover of Cyber Warfare : Cyber-Attack Preparation
Open Library

Cyber Warfare : Cyber-Attack Preparation

By Ismael Pokrzywa

First published in 2021...

View Book →
Cover of SECURE DATA TRANSMISSION THROUGH HYBRID CRYPTOGRAPHY AND STEGANOGRAPHIC TECHNIQUES
Internet Archive

SECURE DATA TRANSMISSION THROUGH HYBRID CRYPTOGRAPHY AND STEGANOGRAPHIC TECHNIQUES

By International Journal of Engineering Science and Advanced Te

Secure Data Transmission Has Become A Critical Requirement In Modern Communication Systems Due To The Increasing Risks Of Cyberattacks, Data Breaches, And Unauthorized Access. Traditional Security Mec...

View Book →
Cover of Anatomy of a Cyberattack
Open Library

Anatomy of a Cyberattack

By Mikko Niemelä

First published in 2016...

View Book →
Cover of InfraGuard Advancing Critical Infrastructure Security through Real Time Threat Detection and Automat
Internet Archive

InfraGuard Advancing Critical Infrastructure Security through Real Time Threat Detection and Automat

By Saloni Hingane | Shweta Wase | Sakshi Umate | Prof. Anupam C

Important systems like power grids, transportation networks, and water supplies are essential for modern life. However, they are at risk from cyberattacks, which can threaten national security, the ec...

View Book →
Cover of Lights out
Open Library

Lights out

By Ted Koppel, Ted Koppel

First published in 2015...

View Book →
Cover of Cybersecurity in health sector: a systematic review of the literature
Internet Archive

Cybersecurity in health sector: a systematic review of the literature

By Catherine Vanessa Peve Herrera, Jonathan Steve Mendoza Valca

Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to hel...

View Book →
Cover of DTIC AD1029813: Short Term Cyber Attacks with Long Term Effects and Degradation of Supply Chain Capa
Internet Archive

DTIC AD1029813: Short Term Cyber Attacks with Long Term Effects and Degradation of Supply Chain Capa

By Defense Technical Information Center

Historically, cyber-attacks targeting computer networks have sometimes favored the attacker over the defender, resulting in great loss of information or denial of service. This thesis investigates the...

View Book →
Cover of Deep Learning Approach For Intelligent Intrusion Detection System
Internet Archive

Deep Learning Approach For Intelligent Intrusion Detection System

By IRJASH Journal

This paper focuses on preventing cyber attacks, which are common on any device connected to the internet. In order to create an intrusion detection system (IDS) that can recognise and differentiate cy...

View Book →
Cover of DTIC AD1019971: Cyberwar and B.H. Liddell Hart's Indirect Approach
Internet Archive

DTIC AD1019971: Cyberwar and B.H. Liddell Hart's Indirect Approach

By Defense Technical Information Center

This study attempts to illuminate cyberwarfare's efficacy as an indirect approach using B.H Liddell Hart's principles of the indirect approach as described in his book, Strategy. His principles are ap...

View Book →
Cover of Inside the enemy's computer
Open Library

Inside the enemy's computer

By Clement Guitton

First published in 2017...

View Book →
Cover of 23125 Rishika Network Intrusion Detection System with Time-Based Sequential Cluster Models Using LST
Internet Archive

23125 Rishika Network Intrusion Detection System with Time-Based Sequential Cluster Models Using LST

By Ravi Vendra Rishika, Baskoro Adi Pratomo, and Shintami Chusn

Technological development and the growth of the internet today have a positive and revolutionary impact in various areasof human life, such as banking, health, science, and more. The presence of open ...

View Book →
Cover of Cybertwists
Open Library

Cybertwists

By Richard Paul Hudson

First published in 2018...

View Book →
Cover of Cyberattacks and Cyberscams
Open Library

Cyberattacks and Cyberscams

By Jennifer Stephan

First published in 2022...

View Book →
Cover of Preventing Cyber-Attacks
Open Library

Preventing Cyber-Attacks

By Michael Udofot

First published in 2021...

View Book →
Cover of Leading issues in information warfare and security research. [Volume 1]
Internet Archive

Leading issues in information warfare and security research. [Volume 1]

By Unknown Author

xxxiii, 205 pages : 21 cm...

View Book →
Cover of Managing Threats of Cyber-Attacks on Mobile Devices
Open Library

Managing Threats of Cyber-Attacks on Mobile Devices

By Anthony Kithome

First published in 2018...

View Book →
Cover of DTIC AD1026655: A Model for Real-Time Data Reputation Via Cyber Telemetry
Internet Archive

DTIC AD1026655: A Model for Real-Time Data Reputation Via Cyber Telemetry

By Defense Technical Information Center

The federal government faces a monumental task of protecting national security information, advanced warfighting capabilities and the personal information entrusted by hundreds of millions of American...

View Book →
Cover of Hass & Associates Hong Kong Cybersecurity Företag, Som Söker Gemensamma Grundvalar
Internet Archive

Hass & Associates Hong Kong Cybersecurity Företag, Som Söker Gemensamma Grundvalar

By Unknown Author

En obeveklig störtflod av cyberattacks har lämnat många företags trygghet officierna söker en tydligare gemensam förståelse av vad som utgör god säkerhetsstrategi, och ser att försäkringsbr...

View Book →
Cover of Cyberwarfare/Cyberattacks
Open Library

Cyberwarfare/Cyberattacks

By Nick Nizo

First published in 2016...

View Book →
Cover of Combating Cyberattacks Targeting the AI Ecosystem
Open Library

Combating Cyberattacks Targeting the AI Ecosystem

By Aditya Sood

First published in 2024...

View Book →
Cover of Zero day : China's cyber wars
Internet Archive

Zero day : China's cyber wars

By Williams, T. L., author

335 pages : 22 cm...

View Book →
Cover of Adaptive Intrusion Discovery in Real-Time Networks Using Advanced Computational Intelligence
Internet Archive

Adaptive Intrusion Discovery in Real-Time Networks Using Advanced Computational Intelligence

By International Research Journal on Advanced Engineering Hub (

Digital plexity of cybersecurity risks has increased due to the Digital ecosystems, Internet of Things (IoT) bias, parallel computing, and fifth-generation (5G) deployment. The compass and complicatio...

View Book →
Cover of DTIC AD1034155: Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems
Internet Archive

DTIC AD1034155: Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems

By Defense Technical Information Center

The project was started in this quarter. A kickoff meeting was held on September 26-27 in UCI, where the participants revised the proposal text together in order to ensure a common understanding of th...

View Book →
Cover of Joshua D. Freilich (Political Deviance & Colonialism)
Internet Archive

Joshua D. Freilich (Political Deviance & Colonialism)

By Joshua D. Freilich

Joshua D. Frelich Culture, Conflict, Ideologically Motivated Violence, (International Political Economy, Ethno-nationalism) ---- Adamczyk, A., Freilich, J. D., & Kim, C. (2017). Religion and Crime: A ...

View Book →
Cover of Cyberattacks
Open Library

Cyberattacks

By Scientific American Scientific American Editors

First published in 2023...

View Book →
Cover of Cyber Polygon Report Results 2019
Internet Archive

Cyber Polygon Report Results 2019

By World Economic Forum

What is Cyber Polygon? Cyber Polygon is an international online exercise prioritising joint response to cyberthreats and the improvement of business cooperation in the fight against cybercrime...

View Book →
Cover of Surviving a Cyberattack
Open Library

Surviving a Cyberattack

By Shipley Todd, Bowker Art

First published in 2024...

View Book →
Cover of DTIC AD1043399: PRiFi Networking for Tracking-Resistant Mobile Computing
Internet Archive

DTIC AD1043399: PRiFi Networking for Tracking-Resistant Mobile Computing

By Defense Technical Information Center

As the most serious cyber-attack threats rapidly shift from untargeted toward increasingly targeted methods, it is becoming correspondingly more crucial for organizations to protect the identity and l...

View Book →
Cover of Cybersecurity and Political Elections: Safeguarding Democracy in a Digital World
Internet Archive

Cybersecurity and Political Elections: Safeguarding Democracy in a Digital World

By Ashri, Gunjan

Abstract As political elections increasingly move into the digital realm, concerns over cybersecurity have become central to safeguarding democratic processes. From sophisticated hacking attempts to d...

View Book →
Cover of Proceedings of a workshop on deterring cyberattacks
Open Library

Proceedings of a workshop on deterring cyberattacks

By National Research Council (U.S.). Committee on Deterring Cyb

First published in 2010...

View Book →
Cover of DTIC AD1019319: New Tools for Cyber Terrorism
Internet Archive

DTIC AD1019319: New Tools for Cyber Terrorism

By Defense Technical Information Center

New tools used by terrorist organizations are not what we think. Yes, they still have their mortars, IEDs, VBIEDs and humans sacrifices to explode in some populated area of a country but the tools dis...

View Book →