X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
stuxnet (41) 41
internet (13) 13
security (11) 11
cybersecurity (10) 10
international relations (9) 9
malware (9) 9
political science (9) 9
cyberspace (7) 7
war (7) 7
computer security (6) 6
cyberwar (6) 6
analysis (5) 5
espionage (5) 5
computer worms (4) 4
cyber war (4) 4
cyber-security (4) 4
data security (4) 4
internet crime (4) 4
national security (4) 4
networks (4) 4
scada (4) 4
software (4) 4
stuxnet worm (4) 4
technology (4) 4
worm (4) 4
computer science, software engineering (3) 3
cyber security (3) 3
cyber-physical systems (3) 3
engineering, electrical & electronic (3) 3
flame (3) 3
iran (3) 3
mathematical models (3) 3
social issues (3) 3
spyware (3) 3
virus (3) 3
weapons (3) 3
attacks (2) 2
capabilities (2) 2
china (2) 2
communication networks (2) 2
computer networks (2) 2
computer science, hardware & architecture (2) 2
computer simulation (2) 2
computers (2) 2
conflict (2) 2
connectivity (2) 2
cooperation (2) 2
cyber attack (2) 2
cyber espionage (2) 2
cyber warfare (2) 2
cyber-terrorism (2) 2
cyber-weapons (2) 2
cyberterrorism (2) 2
discovery (2) 2
exploitation (2) 2
gauss (2) 2
grippers (2) 2
information systems (2) 2
information technology (2) 2
information warfare (2) 2
informationstechnologie (2) 2
infrastructure (2) 2
international conferences (2) 2
international cooperation (2) 2
intrusion (2) 2
intrusion detection (2) 2
law (2) 2
monitoring (2) 2
natanz (2) 2
network (2) 2
nuclear proliferation (2) 2
nuclear weapons (2) 2
politics (2) 2
propagation (2) 2
sabotage (2) 2
safety and security measures (2) 2
sensors (2) 2
software reliability (2) 2
stuxnet virus (2) 2
terrorism (2) 2
united states (2) 2
virtual reality (2) 2
vulnerability (2) 2
access control (1) 1
active monitoring (1) 1
actor-network (1) 1
actor-network theory (1) 1
advanced technology industry (1) 1
agreements (1) 1
aizsardzības rūpniecība (1) 1
algorithms (1) 1
alterglobalismus (1) 1
alterglobalizace (1) 1
alterglobalizacija (1) 1
alterglobalizacja (1) 1
alterglobalização (1) 1
alterglobalizm (1) 1
alterglobalizmas (1) 1
alterglobalizácia (1) 1
altermondialisation (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Communications, ISSN 1796-2021, 11/2013, Volume 8, Issue 11, pp. 716 - 723
Journal Article
2011 Frontiers of Information Technology, 12/2011, pp. 142 - 147
... (viruses, worms and Root kits). They stealth their existence and also use administrator rights without knowing legal user... 
Metasploit Framework | Programmable Logic Controllers | Stuxnet | Malware | Backtrack | Servers | IP networks | Print Spooler | Grippers | Local area networks | Payloads | Programmable logic controllers | Metasploit framework | Print spooler
Conference Proceeding
IEEE transactions on industrial electronics (1982), ISSN 0278-0046, 1/2020, pp. 1 - 1
The problem of attack detection for Stuxnet in the industrial control system is discussed in this paper. Different operating modes (normal and hazard modes)... 
Computer worms | Networked control systems | hidden Markov model | time-varying transtion probabilities | Hidden Markov models | Process control | Stuxnet attack | Hazards | expectation maximization algorithm | cybersecurity
Journal Article
IEEE transactions on smart grid, ISSN 1949-3061, 2020, Volume 11, Issue 1, pp. 291 - 300
Recent cybersecurity incidents such as Stuxnet and Irongate alert us to the threats faced by critical cyber-physical systems. These attacks compromise the... 
Analytical models | Computer worms | moving target defense | System dynamics | Cyber-physical system security | Detectors | stealthy attack | Stuxnet | Power grids | Communication networks | CYBER-PHYSICAL SYSTEMS | ENGINEERING, ELECTRICAL & ELECTRONIC | Configurations | Taxonomy | Computer security | Target detection
Journal Article
IEEE Internet Computing, ISSN 1089-7801, 03/2016, Volume 20, Issue 2, pp. 96 - c3
Centralized power generation and widespread distribution contribute to major vulnerabilities for US energy. To ensure secure power grid systems for the future,... 
secure power generation | Internet/Web technologies | power grid | Stuxnet worm | cybersecurity | SCADA | cyberattacks | Cyberattacks | Cybersecurity | Secure power generation | Power grid | COMPUTER SCIENCE, SOFTWARE ENGINEERING | Design engineering | Computation | Energy distribution | Control systems | Internet | Electric power grids | Renewable resources | Monitoring
Journal Article
2018 21st Saudi Computer Society National Computer Conference (NCC), 04/2018, pp. 1 - 5
Due the evolution of technology, a new class of sophisticated threats, called Advanced persistent threats (APTs), has arisen and became a pressing problem... 
Computer worms | Microsoft Windows | Duqu | Fires | Triton | Stuxnet | Shamoon | Internet | Security | Information warfare | Targeted Attacks | Flame
Conference Proceeding
FUNDAMENTA INFORMATICAE, ISSN 0169-2968, 2018, Volume 161, Issue 3, pp. 249 - 273
Journal Article
11th European Conference on Information Warfare and Security 2012, ECIW 2012, 2012, pp. 45 - 52
Conference Proceeding
Computer, ISSN 0018-9162, 11/2010, Volume 43, Issue 11, pp. 15 - 18
Topics include the US government permitting use of a part of the wireless spectrum that promises to improve mobile communications, a worm that attacks industrial plants, a muscle-based interface... 
white-space networking | Federal Communications Commission | muscle-based interface | Exmovere | Windows | Exmobaby | sensors | mobile communications | white space | Siemens | wireless spectrum | Microsoft | Stuxnet worm | wireless technology | SCADA
Journal Article
Medienimpulse (Wien), ISSN 2307-3187, 03/2015, Issue 1/2015
Je breiter der Infrastruktur-Anschluss eines Landes an das World Wide Web, desto größer die Angriffsfläche im Fall eines Netzkriegs. Die Messung der virtuellen... 
offensivkraft | usa | defensive capability | information technology | cyberwar | vernetzung | wargames | edward snowden | sony | cross-linking | north korea | puffer overflow | botnetvirus | cyber war | nordkorea | botnet virus | stuxnet | logical bomb | defensivfähigkeit | worm | informationstechnologie | würmer | pufferüberlauf | china | logische bombe | russland; wargames | nsa | offensive capability | interconnectedness
Journal Article
Computer, ISSN 0018-9162, 11/2010, Volume 43, Issue 11, pp. 6 - 8
Journal Article
International Journal of Critical Infrastructures, ISSN 1475-3219, 1/2013, Volume 9, Issue 1-2, pp. 52 - 73
Conference Proceeding
Journal Article
The Washington post, ISSN 0190-8286, 11/2014
.... $25 As you turn the last page of Kim Zetter's new book about the worm and virus that sabotaged Iran's nuclear program, don't be surprised if you find yourself starting to mull over a career change... 
Electronic warfare | Books -- Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon | Zetter, Kim | Network security | Nonfiction | Anti-virus software | National security
Newspaper Article
2012 Third Worldwide Cybersecurity Summit (WCS), 10/2012, pp. 1 - 5
This paper introduces a technical, social and ethical organization freely sharing cyber attack vectors in the spirit of global co-operation crossing... 
network management systems | strengths in autism | Manuals | Computer crime | Gauss | IP V6 | Aurora | ASD | Weapons | encryption | weaponization | SIEM | Autistic Spectrum Disorder | neuro-typical | Passwerk | man-in-the-middle | big data | Kernel | Flame | attack vectors | Duq | cyber defense | worm | cross-correlatio | big data analytics | Asperger's Sydrome | MSSP | network flows | cyber intelligence sharing | Autism | CER | securITism | Stuxnet | active monitoring
Conference Proceeding
Survival (London), ISSN 1468-2699, 2011, Volume 53, Issue 1, pp. 23 - 40
The discovery in June 2010 that a cyber worm dubbed 'Stuxnet' had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now... 
INTERNATIONAL RELATIONS | POLITICAL SCIENCE | Third parties | Objectives | Discovery | Headaches | War | Risk | Information warfare | Benefit cost analysis | Defense industry | Weapons | Technology | Organized crime | Outsourcing | National security | Military air strikes | Injuries | Internet crime | Stuxnet | Cyber war | Natanz
Journal Article
システム/制御/情報, ISSN 0916-1600, 2012, Volume 56, Issue 7, pp. 361 - 366
Journal Article
Entropy (Basel, Switzerland), ISSN 1099-4300, 2015, Volume 17, Issue 4, pp. 2367 - 2408
Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and... 
Malware detection | Entropy | Anomaly detection | INTRUSION-DETECTION | ATTACKS | SHANNON | STUXNET | MODEL | PHYSICS, MULTIDISCIPLINARY | Networks | Intrusion | Tasks | Malware | Fraud | Data mining | Statistics | Expert systems | Anomalies | malware detection | anomaly detection | entropy
Journal Article
Applied mechanics and materials, ISSN 1660-9336, 06/2014, Volume 568-570, pp. 1417 - 1421
... that have started emerging networks to emerge in the mid 1980's, starting with the known Morris Worm... 
Industrial system network | Stuxnet | Security | SCADA
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.