Sign in

Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes.

Da-Yu Kao
Published in: ICACT (2020)
Keyphrases
  • cyber attacks
  • cyber security
  • cyber defense
  • data mining
  • attack detection
  • information systems
  • decision making
  • low cost
  • intrusion detection system
  • countermeasures
  • resource constrained