• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Book chapter

Methodology for Detecting Traces of Preparation for Cyber Attacks

Nazarov A., Abhishek V., Voronkov I. M., Sunakshi S., Nitish Kumar O.

Abstract—This article proposes the order of description and
classification of digital traces of the attacking object and new
methodical recommendations for creating a protection function
to counter cyber attacks.