2020 3rd International Conference on Information and Computer Technologies (ICICT) 2020
DOI: 10.1109/icict50521.2020.00077
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Filtering employs a filtering system based on comparing packet source addresses to a blacklist, blocking any suspicious traffic so the attacking packets will not reach their intended targets in this manner. Reconfiguring the network's architecture to provide the victim extra resources or shut down the attacking nodes is one approach [118]. In a wireless smart grid, a wireless jamming attack should be the principal denial-of-service attack.…”
Section: Detection and Defense For Dos Attackmentioning
confidence: 99%
“…Filtering employs a filtering system based on comparing packet source addresses to a blacklist, blocking any suspicious traffic so the attacking packets will not reach their intended targets in this manner. Reconfiguring the network's architecture to provide the victim extra resources or shut down the attacking nodes is one approach [118]. In a wireless smart grid, a wireless jamming attack should be the principal denial-of-service attack.…”
Section: Detection and Defense For Dos Attackmentioning
confidence: 99%
“…The authors mention that when administrative processes are affected by cyberattacks, the management of public organizations has serious problems in decision-making [40]. The authors proposed several types of methods that allow to optimize processes and flow in information security; considering as a starting point the definition of vulnerabilities and risk analysis [41]. The authors analyze the practical architecture of vulnerability information exchange for security risk analysis in the automotive sector [42].…”
Section: Related Jobsmentioning
confidence: 99%