[PDF][PDF] Analysis of different types of network attacks on the GNS3 platform
R Daş, B Bitikçi - Sakarya University Journal of Computer and …, 2020 - dergipark.org.tr
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks
are modeled on GNS3 emulator platform and network security is analyzed. A network …
are modeled on GNS3 emulator platform and network security is analyzed. A network …
[PDF][PDF] Advanced Persistent Threats in COVID-19 Pandemic Process
Abstract Information is important in every period and obtained in different ways and easily
accessible. Today, with the development of technology, it has become easier to reach …
accessible. Today, with the development of technology, it has become easier to reach …
Макет стенда-тренажера для имитации атак на информационные системы
АА Белгородцев, ОТ Данилова… - … систем, механизмов и …, 2020 - elibrary.ru
В настоящей работе представлено описание виртуального стенда-тренажера для
практической демонстрации возможностей тестирования на проникновение в условиях …
практической демонстрации возможностей тестирования на проникновение в условиях …
The Security Threat and Strategy Analysis of Space Information Network
S Chundong, J Luting, M Yaqi, L Shaohua - Space Information Networks …, 2018 - Springer
According to the characteristics of space information network, this paper introduces a
security threat model, and then makes a detailed threat analysis for network system from five …
security threat model, and then makes a detailed threat analysis for network system from five …