2014
DOI: 10.4018/978-1-4666-5888-2.ch147
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Methods behind Cyber Terrorism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The industry has great importance in the social and economic well-being. An attack would lead to the loss of crucial data and money [14]. Another disastrous attack would be on the defense system.…”
Section: Discussion Of Current Issues and Challengesmentioning
confidence: 99%
“…The industry has great importance in the social and economic well-being. An attack would lead to the loss of crucial data and money [14]. Another disastrous attack would be on the defense system.…”
Section: Discussion Of Current Issues and Challengesmentioning
confidence: 99%
“…In order of having a free society, we need to have freedom from analysis about behaviors and communications among us. When considering issues of privacy, cyber terrorism, and digital crime it Tails allows us to navigate freely, safely, and securely Dawson, Omar, & Abramson 2015). In our hyperconnected society, it is imperative that anonymity is maintained during certain actions because of misuse and abuse.…”
Section: Discussionmentioning
confidence: 99%
“…In summary, while impersonation attacks (spoofing) are usually done by impostors who are prepared to mimic a genuine user, confusion attacks are designed to ensure that the user stays under the face recognition system radar. Despite their completely distinct aims, the ISO standard [16] on biometric PAD lists both kinds of assaults. This article focuses on impersonation assaults, wherein impostors are able either to directly utilise biometric data from a genuine user to launch an attack or build PAIs for face recognition (Presentation Attack Instruments, typically spoofs or fakes…”
Section: Facial Spoofing Attacksmentioning
confidence: 99%