Afficher la notice abrégée

dc.creatorBrékine A., Papathanasiou A., Kavallieros D., Ziegler S., Hemmens C., Quesada Rodriguez A., Germanos G., Kokkinis G., Leventakis G., Armin J., Bothos J.en
dc.date.accessioned2023-01-31T07:40:29Z
dc.date.available2023-01-31T07:40:29Z
dc.date.issued2019
dc.identifier10.1007/978-3-030-04984-3_5
dc.identifier.issn21991073
dc.identifier.urihttp://hdl.handle.net/11615/72093
dc.description.abstractThis chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. Then we will elaborate on the role of information from the point of view of various relevant stakeholders (cybercriminals, potential cybercrime victims, cyber-defence services providers, cybersecurity regulatory and law enforcement authorities, researchers). Finally, we will discuss the future of cybersecurity in the context of IoT and present both the underlying opportunities and threats. © Springer Nature Switzerland AG 2019.en
dc.language.isoenen
dc.sourceInternet of Thingsen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85064767288&doi=10.1007%2f978-3-030-04984-3_5&partnerID=40&md5=613832962600bde6a66d5333ef83def2
dc.subjectComputer crimeen
dc.subjectInternet of thingsen
dc.subjectNetworks (circuits)en
dc.subjectCyber securityen
dc.subjectCybercrimeen
dc.subjectCybercriminalsen
dc.subjectDefence servicesen
dc.subjectEnforcement authoritiesen
dc.subjectNetwork threatsen
dc.subjectStakeholder managementen
dc.subjectThreaten
dc.subjectLaws and legislationen
dc.subjectSpringer International Publishingen
dc.titleNetwork threat analysisen
dc.typebookChapteren


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée