First Page | Document Content | |
---|---|---|
Cyberwarfare Computer security Computer network security Cybercrime National security Cyber-attack Denial-of-service attack Malware Stuxnet Botnet Attack Spyware | Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISRAdd to Reading ListSource URL: www.casos.cs.cmu.eduDownload Document from Source WebsiteFile Size: 612,36 KBShare Document on Facebook |