Attacker Model Lab
MetadataShow full item record
This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets.
tutquizpresentTutorialQuizPresentationInteractive Media Element
Showing items related by title, author, creator and subject.
Vish, Jeffrey A. (Monterey, California. Naval Postgraduate School, 2006-09);The Air Base has long been a potential target of attack for enemy planners. An effective way to attack the United States Air Force (USAF) is to avoid its usual dominance in the air and use an asymmetrical approach, attacking ...
Petrakos, Nikolaos (Monterey, California. Naval Postgraduate School, 2009-09);In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function ...
Rowe, Neil C.; Goh, Han C.; Lim, Sze L.; Duong, Binh T. (Monterey, California. Naval Postgraduate School, 2007-03);A key problem in research in cyberwarfare is the difficulty of conducting experiments with real attackers; science requires experiments, and it is desirable to make information warfare scientific where we can. Some data ...