An Enemy Without Boundaries

Isaac Porche, Jerry Sollinger, Shawn McKay

    Research output: Contribution to journalArticlepeer-review

    Abstract

    It is impossible to block every cyber attack, so strategy and policy should be focused on how to respond once that attack occurs
    Original languageEnglish (US)
    Article number139
    Pages (from-to)34-39
    Number of pages6
    JournalProceedings
    Volume138
    Issue number10
    StatePublished - Oct 2012

    Fingerprint

    Dive into the research topics of 'An Enemy Without Boundaries'. Together they form a unique fingerprint.

    Cite this