Modeling malicious activities in cyber space

Yu, Shui, Wang, Guojun and Zhou, Wanlei 2015, Modeling malicious activities in cyber space, IEEE network, vol. 29, no. 6, November-December, pp. 83-87, doi: 10.1109/MNET.2015.7340429.

Attached Files
Name Description MIMEType Size Downloads

Title Modeling malicious activities in cyber space
Author(s) Yu, ShuiORCID iD for Yu, Shui
Wang, Guojun
Zhou, WanleiORCID iD for Zhou, Wanlei
Journal name IEEE network
Volume number 29
Issue number 6
Season November-December
Start page 83
End page 87
Total pages 5
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2015
ISSN 0890-8044
Keyword(s) Science & Technology
Computer Science, Hardware & Architecture
Computer Science, Information Systems
Engineering, Electrical & Electronic
Computer Science
Summary Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.
Language eng
DOI 10.1109/MNET.2015.7340429
Field of Research 080109 Pattern Recognition and Data Mining
0906 Electrical And Electronic Engineering
0805 Distributed Computing
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, IEEE
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 19 times in TR Web of Science
Scopus Citation Count Cited 21 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 400 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Thu, 10 Mar 2016, 09:36:00 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact