The global cyber-vulnerability report:
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies t...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Terrorism, security, and computation
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. -- Provided by publisher |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke. 2. Autor auf dem Umschlagdeckel als Ovelgonne bezeichnet |
Beschreibung: | xii, 296 Seiten Diagramme, Karten (farbig) 24 cm |
ISBN: | 3319257587 9783319798363 9783319257587 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044272182 | ||
003 | DE-604 | ||
005 | 20200304 | ||
007 | t | ||
008 | 170413s2015 |||| b||| 00||| eng d | ||
020 | |a 3319257587 |9 3-319-25758-7 | ||
020 | |a 9783319798363 |9 978-3-319-79836-3 | ||
020 | |a 9783319257587 |9 978-3-319-25758-7 | ||
035 | |a (OCoLC)957618515 | ||
035 | |a (DE-599)BVBBV044272182 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-11 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Subrahmanian, V. S. |d 1963- |e Verfasser |0 (DE-588)113770898 |4 aut | |
245 | 1 | 0 | |a The global cyber-vulnerability report |c V.S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a xii, 296 Seiten |b Diagramme, Karten (farbig) |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Terrorism, security, and computation | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke. 2. Autor auf dem Umschlagdeckel als Ovelgonne bezeichnet | ||
505 | 8 | |a Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis | |
520 | 3 | |a This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. -- Provided by publisher | |
650 | 4 | |a Informatik | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Statistik | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer science | |
653 | 0 | |a Computer security | |
653 | 0 | |a Artificial intelligence | |
653 | 0 | |a System safety | |
653 | 0 | |a Statistics | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ovelgönne, Michael |e Verfasser |0 (DE-588)1018013733 |4 aut | |
700 | 1 | |a Dumitras, Tudor |e Verfasser |4 aut | |
700 | 1 | |a Prakash, B. Aditya |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-25760-0 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029676782&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029676782 |
Datensatz im Suchindex
_version_ | 1804177456730472448 |
---|---|
adam_text | Contents
1 Introduction........................................................... 1
1.1 Data and Methodology......................................... 4
1.2 The World’s Most Cyber-Vulnerable Countries...................... 5
1.3 The Relationship Between Cyber-Attacks and GDP................... 9
1.4 The Relationship between Cyber-Attacks
and the Human Development Index............................ 11
1.5 The Relationship between Cyber-Attacks and HDI Health Index .... 13
1.6 The Relationship Between Cyber-Attacks and Education............ 15
1.6.1 The Overall Education Index............................. 16
1.6.2 Combined Gross Enrollment in Education................. 17
1.6.3 Expected Years of Schooling.............................. 17
1.7 Is Software Piracy Relevant to Cyber-Risk?...................... 17
1.8 Some Related Work............................................... 19
1.9 National Cybersecurity Policies: A Quick Summary................ 22
1.10 Recommendations............................................... 26
1.10.1 Citizen Education...................................... 26
1.10.2 Building up a National Cyber-Defense Capability..... 27
1.10.3 Building Up Timely Cybersecurity Legislation
and Regulation.......................................... 28
1.10.4 International Cybersecurity Cooperation.................. 29
1.10.5 Cybersecurity Attack Forecasting ........................ 29
1.11 Conclusion.................................................... 30
References.......................................................... 31
2 Types of Malware and Malware Distribution Strategies.................. 33
2.1 Types of Malware.............................................. 34
2.1.1 Trojans................................................ 34
2.1.2 Worms.................................................. 36
2.1.3 Viruses................................................ 37
2.1.4 Other Forms of Malware................................. 38
IX
X
Contents
2.2 Malware Distribution........................................... 38
2.2.1 Drive-by-Downloads...................................... 39
2.2.2 Email..................................................... 39
2.2.3 Network Intrusion......................................... 39
2.2.4 Social Engineering....................................... 40
2.2.5 Downloaders........................................... 40
2.3 Business Models.................................................. 40
2.3.1 Click Fraud............................................... 41
2.3.2 Keyloggers................................................ 41
2.3.3 Spam...................................................... 41
2.4 Cross-Country Studies............................................ 42
2.5 Conclusion....................................................... 43
References............................................................ 44
3 Methodology and Measurement........................................... 47
3.1 Research Question.............................................. 47
3.2 Data........................................................... 47
3.3 Dependent Variables.............................................. 48
3.4 Features...................................................... 50
3.4.1 Host-Based Features....................................... 50
3.4.2 Macro-Economic Features................................... 52
3.5 Data Preparation................................................. 53
3.6 Data Analysis.................................................... 53
3.6.1 Time-Series Analysis of Attacks........................... 54
3.6.2 Macro Economic Factors................................... 54
3.6.3 Host-Based Factors........................................ 58
3.6.4 Percentage of Downloaded Binaries and Risk.............. 58
3.6.5 Percentage Low Prevalence Binary and Risk................. 61
3.6.6 Percentage Unsigned Binaries and Risk..................... 61
3.6.7 Attacks of Misleading Applications and Spyware............ 61
3.6.8 Country Similarity by Host-Based Features................. 64
3.6.9 Multivariate Analysis................................... 65
References............................................................ 67
4 Human Behavior and Susceptibility to Cyber-Attacks.................. 69
4.1 Introduction..................................................... 69
4.2 Dataset and Set-up............................................... 71
4.2.1 Problem Statement......................................... 72
4.2.2 The WINE Datasets ....................................... 72
4.3 Feature Construction........................................... 74
4.4 User Classification.............................................. 76
4.5 User Behavior and Cyber-Attacks.................................. 78
4.5.1 Analysis Methods.......................................... 79
4.5.2 Number of Binaries and Risk............................... 80
4.5.3 Percentage of Low/High Prevalence and Unique
Binaries and Risk......................................... 81
Contents
xi
4.5.4 Percentage of Unsigned Binaries and Risk............... 85
4.5.5 Percentage of Downloaded Binaries and Risk............ 86
4.5.6 User Travel History and Risk.......................... 88
4.6 Related Work..........................,..................... 89
4.7 Discussion and Conclusion................................... 90
References........................................................ 91
5 Country by Country Analysis....................................... 93
5.1 Argentina................................................... 94
5.2 Australia..................................................... 98
5.3 Austria.................................................... 103
5.4 Belgium...................................................... 109
5.5 Brazil....................................................... Ill
5.6 Canada...................................................... 118
5.7 Chile.................................................... 122
5.8 China........................................................ 126
5.9 Colombia................................................... 131
5.10 Czech Republic............................................... 135
5.11 Denmark...................................................... 140
5.12 Finland...................................................... 144
5.13 France................................................... 150
5.14 Germany...................................................... 153
5.15 Greece..................................................... 158
5.16 Hong Kong................................................... 161
5.17 India...................................................... 166
5.18 Ireland.................................................. 171
5.19 Israel....................................................... 175
5.20 Italy........................................................ 180
5.21 Japan........................................................ 184
5.22 Malaysia................................................. 190
5.23 Mexico....................................................... 194
5.24 Netherlands................................................ 197
5.25 New Zealand................................................ 202
5.26 Norway.................................................... 206
5.27 Philippines.............................................. 211
5.28 Poland..................................................... 215
5.29 Portugal................................................... 220
5.30 Puerto Rico................................................ 224
5.31 Russia....................................................... 227
5.32 Saudi Arabia.............................................. 232
5.33 Singapore.................................................... 238
5.34 South Africa................................................. 241
5.35 South Korea.................................................. 246
5.36 Spain...................................................... 250
5.37 Sweden..................................................... 254
Contents
xii
5.38 Switzerland................................................. 257
5.39 Taiwan.................................................... 262
5.40 Thailand................................................ 266
5.41 Turkey.................................................. 270
5.42 United Arab Emirates........................................ 274
5.43 United Kingdom.............................................. 278
5.44 United States............................................... 283
References...................................................... 288
Index
293
|
any_adam_object | 1 |
author | Subrahmanian, V. S. 1963- Ovelgönne, Michael Dumitras, Tudor Prakash, B. Aditya |
author_GND | (DE-588)113770898 (DE-588)1018013733 |
author_facet | Subrahmanian, V. S. 1963- Ovelgönne, Michael Dumitras, Tudor Prakash, B. Aditya |
author_role | aut aut aut aut |
author_sort | Subrahmanian, V. S. 1963- |
author_variant | v s s vs vss m o mo t d td b a p ba bap |
building | Verbundindex |
bvnumber | BV044272182 |
classification_rvk | ST 276 ST 277 |
contents | Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis |
ctrlnum | (OCoLC)957618515 (DE-599)BVBBV044272182 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03860nam a2200589 c 4500</leader><controlfield tag="001">BV044272182</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200304 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170413s2015 |||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319257587</subfield><subfield code="9">3-319-25758-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319798363</subfield><subfield code="9">978-3-319-79836-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319257587</subfield><subfield code="9">978-3-319-25758-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)957618515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044272182</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Subrahmanian, V. S.</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113770898</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The global cyber-vulnerability report</subfield><subfield code="c">V.S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 296 Seiten</subfield><subfield code="b">Diagramme, Karten (farbig)</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Terrorism, security, and computation</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke. 2. Autor auf dem Umschlagdeckel als Ovelgonne bezeichnet</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. -- Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer science</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">System safety</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Statistics</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ovelgönne, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1018013733</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dumitras, Tudor</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prakash, B. Aditya</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-25760-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029676782&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029676782</subfield></datafield></record></collection> |
id | DE-604.BV044272182 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:48:22Z |
institution | BVB |
isbn | 3319257587 9783319798363 9783319257587 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029676782 |
oclc_num | 957618515 |
open_access_boolean | |
owner | DE-739 DE-11 |
owner_facet | DE-739 DE-11 |
physical | xii, 296 Seiten Diagramme, Karten (farbig) 24 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series2 | Terrorism, security, and computation |
spelling | Subrahmanian, V. S. 1963- Verfasser (DE-588)113770898 aut The global cyber-vulnerability report V.S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash Cham Springer International Publishing 2015 xii, 296 Seiten Diagramme, Karten (farbig) 24 cm txt rdacontent n rdamedia nc rdacarrier Terrorism, security, and computation Hier auch später erschienene, unveränderte Nachdrucke. 2. Autor auf dem Umschlagdeckel als Ovelgonne bezeichnet Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. -- Provided by publisher Informatik Künstliche Intelligenz Statistik Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Computer science Computer security Artificial intelligence System safety Statistics Informatik (DE-588)4026894-9 s Künstliche Intelligenz (DE-588)4033447-8 s Datensicherung (DE-588)4011144-1 s DE-604 Ovelgönne, Michael Verfasser (DE-588)1018013733 aut Dumitras, Tudor Verfasser aut Prakash, B. Aditya Verfasser aut Erscheint auch als Online-Ausgabe 978-3-319-25760-0 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029676782&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Subrahmanian, V. S. 1963- Ovelgönne, Michael Dumitras, Tudor Prakash, B. Aditya The global cyber-vulnerability report Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis Informatik Künstliche Intelligenz Statistik Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4011144-1 (DE-588)4026894-9 |
title | The global cyber-vulnerability report |
title_auth | The global cyber-vulnerability report |
title_exact_search | The global cyber-vulnerability report |
title_full | The global cyber-vulnerability report V.S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash |
title_fullStr | The global cyber-vulnerability report V.S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash |
title_full_unstemmed | The global cyber-vulnerability report V.S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash |
title_short | The global cyber-vulnerability report |
title_sort | the global cyber vulnerability report |
topic | Informatik Künstliche Intelligenz Statistik Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Informatik Künstliche Intelligenz Statistik Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029676782&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT subrahmanianvs theglobalcybervulnerabilityreport AT ovelgonnemichael theglobalcybervulnerabilityreport AT dumitrastudor theglobalcybervulnerabilityreport AT prakashbaditya theglobalcybervulnerabilityreport |