Login / Signup
Under false flag: using technical artifacts for cyber attack attribution.
Florian Skopik
Timea Pahi
Published in:
Cybersecur. (2020)
Keyphrases
</>
cyber attacks
cyber security
attack detection
cyber defense
countermeasures
intrusion detection
critical infrastructure
intrusion detection system
privacy issues
dos attacks
information systems
computer systems
distributed databases
security policies
security mechanisms
smart grid