Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Piping Botnet - Turning Green Technology into a Water Disaster

Publication Type:

Journal Article

Authors:

Ben Nassi; Moshe Sror; Ido Lavi; Yair Meidan; Asaf Shabtai; Yuval Elovici

Source:

arXiv:1808.02131v1 [cs.CR] (2018)
  • 3793 reads
  • Google Scholar
  • RTF
  • EndNote XML

References

Urciuoli, Luca, Toni Männistö, Juha Hintsa, and Tamanna Khan. "Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29, no. 1 (2013): 51-68.

Check also our Google Scolar profile

  • Downloads
  • How to cite
No files have yet been downloaded.
APA style: Nassi, B., Sror M., Lavi I., Meidan Y., Shabtai A., & Elovici Y. (2018).  Piping Botnet - Turning Green Technology into a Water Disaster. arXiv:1808.02131v1 [cs.CR].
Chicago style: Nassi, Ben, Moshe Sror, Ido Lavi, Yair Meidan, Asaf Shabtai, and Yuval Elovici. "Piping Botnet - Turning Green Technology into a Water Disaster." arXiv:1808.02131v1 [cs.CR] (2018).
IEEE style: Nassi, B., M. Sror, I. Lavi, Y. Meidan, A. Shabtai, and Y. Elovici, "Piping Botnet - Turning Green Technology into a Water Disaster", arXiv:1808.02131v1 [cs.CR], 6 Aug 2018.
  • Trending
  • Latest
  • Most cited
  • Hofstede’s Power Distance Matrix: Law Enforcement Leadership Theory and Communication (2,313)
  • Leadership in Developing a Strategy for Military Human Resource Management as Part of Capabilities-Based Defense Planning (2,234)
  • Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific (2,195)
  • Leadership Theories and Defense Reform in the People’s Republic of China (2,194)
  • The Impact of Organizational Design and Leadership on Strategic Communications (2,100)
view all
  • Lessons for NATO to Be Learned from Putin's War in Ukraine: Global Health Engagement, Interoperability, and Lethality
  • Distorting Your Perception of Russia’s Aggression: How Can We Combat Information Warfare?
  • The Impact of War on the Ukraine Military Education System: Moving Forward in War and Peace
  • Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative
  • Russia's Gambit to Redefine the Current World Order
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal