Login / Signup
Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution.
Chang-Hoi Hur
Seong-Pyo Kim
Yoon-Soo Kim
Jung-Ho Eom
Published in:
FiCloud Workshops (2017)
Keyphrases
</>
cyber attacks
critical infrastructure
cyber security
data mining techniques
cyber defense
intrusion detection