Understanding Cyber Warfare

作者: Yan M. Yufik

DOI: 10.1007/978-1-4614-7597-2_5

关键词:

摘要: The history of computing devices goes back to the invention abacus in Babylonia sixteenth century BC. In three and a half millennia which followed, variety calculating were introduced, some them stunningly sophisticated but all sharing common limitation: device could store data only as long programs for manipulation remained mind user.

参考文章(44)
Lingyu Wang, Anoop Singhal, Sushil Jajodia, Measuring the overall security of network configurations using attack graphs Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security. pp. 98- 112 ,(2007) , 10.1007/978-3-540-73538-0_9
C. Tranchita, N. Hadjsaid, M. Viziteu, B. Rozel, R. Caire, ICT and Powers Systems: An Integrated Approach Springer, Dordrecht. pp. 71- 109 ,(2010) , 10.1007/978-90-481-3594-3_5
Neil Charness, Expertise in chess: The balance between knowledge and search. Cambridge University Press. ,(1991)
Åge Torkilseng, Ludovic Pietre-Cambacedes, Mathias Ekstedt, Giovanna Dondossola, John McDonald, Modelling of cyber attacks for assessing smart grid security Cigre Study Committee D2 Colloquium. Buenos Aires, Argentina. 19th - 20th October 2011. ,(2011)
Roger Penrose, Malcolm S. Longair, The Large, the Small and the Human Mind ,(1997)
Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer, STATL: an attack language for state-based intrusion detection Journal of Computer Security. ,vol. 10, pp. 71- 103 ,(2002) , 10.3233/JCS-2002-101-204