Changes of cyber-terrorism: Autonomous terrors and counter-measures
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, In Jung | - |
dc.contributor.author | Lee, Cheol Won | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-12-21T06:53:34Z | - |
dc.date.available | 2022-12-21T06:53:34Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2007-08 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/179735 | - |
dc.description.abstract | Recently many autogenous terrors are occurred in many countries, and this kind of terrors are spread mostly through the Internet. Therefore, there should be regulations and tools to monitor suspicious Internet activities. Recently, due to the increased number of cyber terrors, many countries try to enact regulations against web server misuses. But, the establishment of such laws is slowed by the concerns of privacy of web users. This paper proposed legislative measures against cyber terrors as well as the proposed scheme to collect terror-related information from web servers. The result of this research can reduce overall costs of anti-terror activities in the Internet. ? Springer-Verlag Berlin Heidelberg 2007. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | Changes of cyber-terrorism: Autonomous terrors and counter-measures | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1007/978-3-540-74477-1_7 | - |
dc.identifier.scopusid | 2-s2.0-38049163938 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.4706 LNCS, no.PART 2, pp.75 - 84 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 4706 LNCS | - |
dc.citation.number | PART 2 | - |
dc.citation.startPage | 75 | - |
dc.citation.endPage | 84 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Autonomous agents | - |
dc.subject.keywordPlus | Computer aided software engineering | - |
dc.subject.keywordPlus | Cybernetics | - |
dc.subject.keywordPlus | Internet | - |
dc.subject.keywordPlus | Web services | - |
dc.subject.keywordPlus | Autonomous terrors | - |
dc.subject.keywordPlus | Counter-measures | - |
dc.subject.keywordPlus | Cyber terrorism | - |
dc.subject.keywordPlus | Server misuse | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordAuthor | Autogenous terror | - |
dc.subject.keywordAuthor | CERT | - |
dc.subject.keywordAuthor | Cyber terrorism | - |
dc.subject.keywordAuthor | ISAC | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-540-74477-1_7 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.