Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan DDate:Mar 2012This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is ...Read more
Author:Veerasamy, NamoshaDate:Apr 2009Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to ...Read more