The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.21236/ad1009192
|View full text |Cite
|
Sign up to set email alerts
|

Finding Effective Responses Against Cyber Attacks for Divided Nations

Abstract: Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. FUNDING NUMBERS AUTHOR(S) Ji Min Park PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)Naval Postgraduate School Monterey, CA 93943-5000 PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…DDoS attack methods of inherited attack and IP spoofing hardens tracing of attackers to be tough [13]- [15]. DoS mitigation is hard in a disbursed environment, as it is able to be of any shape both ping of death or clone attack.…”
Section: Documentation Of Service Denial Attacksmentioning
confidence: 99%
“…DDoS attack methods of inherited attack and IP spoofing hardens tracing of attackers to be tough [13]- [15]. DoS mitigation is hard in a disbursed environment, as it is able to be of any shape both ping of death or clone attack.…”
Section: Documentation Of Service Denial Attacksmentioning
confidence: 99%