Inside the enemy's computer : identifying cyber attackers / Clement Guitton.
Attribution is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either...
Saved in:
Online Access: |
Full Text (via Oxford Scholarship Online) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
New York, NY :
Oxford University Press,
2017.
|
Subjects: |
Internet
Full Text (via Oxford Scholarship Online)Online
Call Number: |
HV6773.15.C97
|
---|---|
HV6773.15.C97 | Available |