Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-10 ل  105 نتائج ل ""COMPUTER hacking""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

Subjects: computer attack model; ontology; network attack predictionAmsterdam; Netherlands

  • Source: IFIP Advances in Information and Communication Technology ; 10th International Conference on Human Choice and Computers (HCC) ; https://inria.hal.science/hal-01525096 ; 10th International Conference

تفاصيل العنوان

×
Conference

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

Subjects: computer attack model; ontology; network attack predictionAmsterdam; Netherlands

  • Source: IFIP Advances in Information and Communication Technology ; 10th International Conference on Human Choice and Computers (HCC) ; https://inria.hal.science/hal-01525096 ; 10th International Conference

تفاصيل العنوان

×
Book

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

  • Source: ICT Critical Infrastructures and Society ; IFIP Advances in Information and Communication Technology ; page 226-236 ; ISSN 1868-4238 1868-422X ; ISBN 9783642333316 9783642333323

تفاصيل العنوان

×
Academic Journal

The Economics of Computer Hacking

  • Source: http://www.peterleeson.com/hackers.pdf.

تفاصيل العنوان

×
Academic Journal

The Economics of Computer Hacking

  • Source: http://www.ccoyne.com/economics_of_computer_hacking.pdf.

تفاصيل العنوان

×
  • 1-10 ل  105 نتائج ل ""COMPUTER hacking""