cyber attacks
http://www.yso.fi/onto/yso/p27466
Related publications and other outputs
- Defensive Machine Learning Methods and the Cyber Defence Chain (2023) Turtiainen, Hannu; et al.; A3; 978-3-031-15030-2
- Offensive Machine Learning Methods and the Cyber Kill Chain (2023) Turtiainen, Hannu; et al.; A3; 978-3-031-15030-2
- On Attacking Future 5G Networks with Adversarial Examples : Survey (2023) Zolotukhin, Mikhail; et al.; A1; OA
- UInDeSI4.0 : An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem (2023) Shukla, Amit, K.; et al.; A1; OA
- APT Cyber-attack Modelling : Building a General Model (2022) Lehto, Martti; A4; OA
- Attacking TrustZone on devices lacking memory protection (2022) Stajnrod, Ron; et al.; A1; OA
- Citizens' Cybersecurity Behavior : Some Major Challenges (2022) Li, Ying; et al.; A1; OA
- Cyber-Attacks Against Critical Infrastructure (2022) Lehto, Martti; A3; OA; 978-3-030-91293-2
- Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures (2022) Vähäkainu, Petri; et al.; A3; OA; 978-3-030-91293-2
- Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures (2022) Khandker, Syed; et al.; A1; OA