Network Security最新文献

筛选
英文 中文
The biggest challenges of manually managing PKI certificates 手动管理PKI证书的最大挑战
Network Security Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70052-9
Anthony Ricci
{"title":"The biggest challenges of manually managing PKI certificates","authors":"Anthony Ricci","doi":"10.12968/s1353-4858(22)70052-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70052-9","url":null,"abstract":"Business processes have always been built on trust, and as digital transformation moves more devices and people online, the need for digital trust is rapidly increasing. Today, being able to trust the identity of endpoints, the people using them, and their data and documents, is fundamental to society.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86514774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-enhancing technologies in the design of digital twins for smart cities 智能城市数字孪生体设计中的隐私增强技术
Network Security Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70046-3
Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun
{"title":"Privacy-enhancing technologies in the design of digital twins for smart cities","authors":"Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun","doi":"10.12968/s1353-4858(22)70046-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70046-3","url":null,"abstract":"Digital twin technologies – comprised of data-rich models and machine learning – allow the operators of smart city applications to gain an accurate representation of complex cyber-physical models. However, the implicit need for resilient data protection must be achieved by integrating privacy-preserving mechanisms into the DT system design as part of an effective defence-in-depth strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75341216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-trust architecture is creating a passwordless society 零信任架构正在创造一个无密码的社会
Network Security Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70045-1
Jonas Iggbom
{"title":"Zero-trust architecture is creating a passwordless society","authors":"Jonas Iggbom","doi":"10.12968/s1353-4858(22)70045-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70045-1","url":null,"abstract":"Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"89 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80695708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The case for threat modelling 威胁建模的案例
Network Security Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70040-2
C. Tankard
{"title":"The case for threat modelling","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70040-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70040-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75317132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security service edge: choosing the right solution 安全服务优势:选择正确的解决方案
Network Security Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70041-4
N. Howe
{"title":"Security service edge: choosing the right solution","authors":"N. Howe","doi":"10.12968/s1353-4858(22)70041-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70041-4","url":null,"abstract":"Security service edge (SSE) solutions are designed to address the fundamental security challenges that organisations face in the era of hybrid work, applications in multi-cloud environments, edge computing, and digitisation of their operational technology (OT). But how do you select the right solution?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"155 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76891826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The great security convergence: joining physical devices and cyber security 安全大融合:物理设备和网络安全的融合
Network Security Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70043-8
Scot Sturges
{"title":"The great security convergence: joining physical devices and cyber security","authors":"Scot Sturges","doi":"10.12968/s1353-4858(22)70043-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70043-8","url":null,"abstract":"With the convergence of the physical and digital worlds comes a heightened risk of security threats. Cyber security can no longer be placed on the back burner as organisations continue to incorporate physical security solutions; the likelihood and severity of an information breach rise dramatically as additional devices are contributed to one ubiquitous network.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83286905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DGAs die hard: detecting malicious domains using AI DGAs死路一条:使用AI检测恶意域
Network Security Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70042-6
Bharathasimha Reddy D, Srilekha Talluri, Ruthvik Reddy SL, Amit Nagal, Aditya K. Sood
{"title":"DGAs die hard: detecting malicious domains using AI","authors":"Bharathasimha Reddy D, Srilekha Talluri, Ruthvik Reddy SL, Amit Nagal, Aditya K. Sood","doi":"10.12968/s1353-4858(22)70042-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70042-6","url":null,"abstract":"Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malicious DNS communication. This article looks at the current state of DNS-based threats and how to detect DGA-based malicious DNS communication.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74386346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenges of Log4j – and how to solve them Log4j的挑战——以及如何解决它们
Network Security Pub Date : 2022-05-01 DOI: 10.12968/s1353-4858(22)70038-4
Thomas B. McVey
{"title":"The challenges of Log4j – and how to solve them","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70038-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70038-4","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguard the future of your network 保护你网络的未来
Network Security Pub Date : 2022-05-01 DOI: 10.12968/s1353-4858(22)70039-6
Michael Wood
{"title":"Safeguard the future of your network","authors":"Michael Wood","doi":"10.12968/s1353-4858(22)70039-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70039-6","url":null,"abstract":"Widespread remote working has meant that organisations must be able to provide a high level of accessibility to users scattered across potentially thousands of individual locations. They must also deliver a high level of security assurance against threat actors seeking to take advantage of more diffuse networks.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88429842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incident response: test, don't improvise 事件响应:测试,不要即兴发挥
Network Security Pub Date : 2022-05-01 DOI: 10.12968/s1353-4858(22)70037-2
Andrew Cooke
{"title":"Incident response: test, don't improvise","authors":"Andrew Cooke","doi":"10.12968/s1353-4858(22)70037-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70037-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73798135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信