Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication

    The tendency in cyber attacks has evolved from ones immediately causing abnormal operations to advanced attacks after information extraction by traffic sniffing. In particular, the unchanging characteristics o...

    Sungho Jeon, Jeong-Han Yun, Woo-Nyon Kim in Critical Information Infrastructures Security (2016)