Jihadist attacks on Critical Infrastructure

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy

The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols, to control national infrastructure. Widely used interactive packet manipulation tools, such as Scapy, have not yet been augmented to parse and create DNP3 frames (Biondi 2014). In this paper we extend Scapy to include DNP3, thus allowing us to perform attacks on DNP3 in real-time. Our contribution builds on E...

متن کامل

On Critical Infrastructure Protection and International Agreements

This paper evaluates the prospects for protecting critical social functions from “cyber” attacks carried out over electronic information networks. In particular, it focuses on the feasibility of devising international laws, conventions or agreements to deter and/or punish perpetrators of such attacks. First, it briefly summarizes existing conventions and laws, and explains to which technologica...

متن کامل

On Hardening Problems in Critical Infrastructure Systems

The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have...

متن کامل

Detecting Attacks in Electric Power System Critical Infrastructure Using Rough Classifi cation Algorithm

This paper presents an alternative technique for improving the security of Electric Power Control Systems by implementing anomaly detection methods to identify attacks and faults. By using Rough Sets Classifi cation Algorithm, a set of rules can be defi ned. The alternative approach tries to reduce the number of input variables and the number of examples, offering a more compact set of examples...

متن کامل

Defending Critical Infrastructure

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Belügyi Szemle

سال: 2020

ISSN: 2677-1632,2062-9494

DOI: 10.38146/bsz.spec.2020.1.7