Abstract | ||
---|---|---|
The proliferation of mobile devices, the shift towards cloud computing, and the increased use of information technology in critical infrastructures have opened new attack vectors and risks. Cyber attacks are becoming more sophisticated and persistent, challenging traditional security practices. The impacts of these attacks include expensive data breaches, compromised or stolen records, and loss of... |
Year | DOI | Venue |
---|---|---|
2012 | 10.1002/bltj.21556 | Bell Labs Technical Journal |
Field | DocType | Volume |
Next-generation network,Computer security,Information technology,Computer network,Mobile device,Intellectual property,Data breach,Engineering,Cloud computing | Journal | 17 |
Issue | ISSN | Citations |
3 | 1089-7089 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Suhasini V. Sabnis | 1 | 6 | 1.57 |
Marc Verbruggen | 2 | 0 | 0.34 |
john s hickey | 3 | 1 | 0.93 |
Alan J. Mcbride | 4 | 5 | 1.60 |