INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] ENISA - Threat Landscape Report 2017, 15 Top Cyber-Threats and Trends, 2018.Search in Google Scholar

[2] https://www.aig.com/knowledge-and-insights/k-and-i-article-state-of-cybersecurity-ukmiddle-east-africa#Search in Google Scholar

[3] https://hotforsecurity.bitdefender.com/blog/bitcoin-hijack-steals-from-bothransomware-authors-and-their-victims19525.html?utm_source=SMGlobal&utm_medium=Facebook&utm_campaign=H4SSearch in Google Scholar

[4] https://www.itproportal.com/features/cyber-security-deployment-guide-to-effectivelysafeguard-systems-data/Search in Google Scholar

[5] https://www.rt.com/business/418790-doom-roubini-crypto-crazies-terrorists/<Search in Google Scholar

[6] https://securityboulevard.com/2018/01/an-infrastructure-plan-in-the-21st-century-needsto-address-cybersecurity/Search in Google Scholar

[7] http://securityaffairs.co/wordpress/69100/hacking/bitmessage-zero-day.html;Search in Google Scholar

[8] https://www.symantec.com/content/dam/symantec/docs/security-center/whitepapers/istr-ransomware-2017-en.pdfSearch in Google Scholar

[9] https://www.symantec.com/blogs/feature-stories/2018-cyber-security-predictionsSearch in Google Scholar

[10] https://www.theregister.co.uk/2017/04/25/british_malware_author_2_years_jail_titanium_stresser/ .Search in Google Scholar

eISSN:
2451-3113
ISSN:
1843-6722
Lingua:
Inglese