Under false flag: using technical artifacts for cyber attack attribution

Abstract The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is in the center of interest for nation...

Full description

Bibliographic Details
Main Authors: Florian Skopik, Timea Pahi
Format: Article
Language:English
Published: SpringerOpen 2020-03-01
Series:Cybersecurity
Subjects:
Online Access:http://link.springer.com/article/10.1186/s42400-020-00048-4