Proceedings From the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
DOI: 10.1109/iaw.2004.1437851
|View full text |Cite
|
Sign up to set email alerts
|

Attack attribution in non-cooperative networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…. and the human actor(s) responsible for that behaviour of activity’ (Cohen and Narayanaswamy 2004, p. 52) are discovered and used to attribute the attack to a person. Authorship Analysis techniques have the ability to provide this level of attack attribution.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…. and the human actor(s) responsible for that behaviour of activity’ (Cohen and Narayanaswamy 2004, p. 52) are discovered and used to attribute the attack to a person. Authorship Analysis techniques have the ability to provide this level of attack attribution.…”
Section: Introductionmentioning
confidence: 99%
“… 1 Level 1 attack attribution is the direct tracing of attacks through its attack path (Cohen and Narayanaswamy 2004). …”
mentioning
confidence: 99%