Inside the enemy's computer identifying cyber attackers /
Attribution is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either...
Full description
Saved in:
Main Author: |
Guitton, Clement, |
Other Authors: |
Oxford Scholarship Online. |
Format: |
eBook
|
Language: |
English
|
Published: |
New York, NY :
Oxford University Press,
2017.
|
Physical Description: |
1 online resource : illustrations (black and white)
|
Subjects: |
|