Author:Van Heerden, Renier P; Pieterse, Heloise; Irwin, BDate:Sep 2012This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented ...Read more