Computer and Cyber Security最新文献

筛选
英文 中文
Botnet Behavior and Detection Techniques: A Review 僵尸网络行为和检测技术综述
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-9
Ammar Almomani, O. Dorgham, Mohammad Alauthman, M. Al-Refai, N. Aslam
{"title":"Botnet Behavior and Detection Techniques: A Review","authors":"Ammar Almomani, O. Dorgham, Mohammad Alauthman, M. Al-Refai, N. Aslam","doi":"10.1201/9780429424878-9","DOIUrl":"https://doi.org/10.1201/9780429424878-9","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124007886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms DOM-Guard:在基于移动云平台的HTML5 Web应用程序中击败基于dom的XSS蠕虫注入
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-16
B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta
{"title":"DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms","authors":"B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta","doi":"10.1201/9780429424878-16","DOIUrl":"https://doi.org/10.1201/9780429424878-16","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk 网络安全预测问题:应用计量经济学技术衡量IT风险
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-3
Baidyanath Biswas, S. Patra
{"title":"Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk","authors":"Baidyanath Biswas, S. Patra","doi":"10.1201/9780429424878-3","DOIUrl":"https://doi.org/10.1201/9780429424878-3","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overview of Smartphone Security: Attack and Defense Techniques 智能手机安全概述:攻击和防御技术
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-10
Diksha Goel, A. Jain
{"title":"Overview of Smartphone Security: Attack and Defense Techniques","authors":"Diksha Goel, A. Jain","doi":"10.1201/9780429424878-10","DOIUrl":"https://doi.org/10.1201/9780429424878-10","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114535703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior 上下文感知系统:保护敏感信息和控制网络行为
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-1
Alberto Huertas Celdrán, M. Pérez, F. J. G. Clemente, G. Pérez
{"title":"Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior","authors":"Alberto Huertas Celdrán, M. Pérez, F. J. G. Clemente, G. Pérez","doi":"10.1201/9780429424878-1","DOIUrl":"https://doi.org/10.1201/9780429424878-1","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compendium of Security Issues in Wireless Sensor Networks 无线传感器网络安全问题汇编
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-23
Jasminder Kaur Sandhu, A. Verma, P. Rana
{"title":"A Compendium of Security Issues in Wireless Sensor Networks","authors":"Jasminder Kaur Sandhu, A. Verma, P. Rana","doi":"10.1201/9780429424878-23","DOIUrl":"https://doi.org/10.1201/9780429424878-23","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse 数字时代的网络空间和网络安全:当代安全话语中不断演变的关注
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-4
S. devi, Mohd. Aarif Rather
{"title":"Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse","authors":"S. devi, Mohd. Aarif Rather","doi":"10.1201/9780429424878-4","DOIUrl":"https://doi.org/10.1201/9780429424878-4","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective 基于用户视角的在线社交网络安全问题与挑战
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-22
Somya Ranjan Sahoo, B. Gupta
{"title":"Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective","authors":"Somya Ranjan Sahoo, B. Gupta","doi":"10.1201/9780429424878-22","DOIUrl":"https://doi.org/10.1201/9780429424878-22","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Credit Scoring Using Birds Swarm Optimization 使用蜂群优化的信用评分
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-19
D. Edla, G. Pedunayak, K. Tejaswini, K. Hareesh, Ramalingaswamy Cheruku
{"title":"Credit Scoring Using Birds Swarm Optimization","authors":"D. Edla, G. Pedunayak, K. Tejaswini, K. Hareesh, Ramalingaswamy Cheruku","doi":"10.1201/9780429424878-19","DOIUrl":"https://doi.org/10.1201/9780429424878-19","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115919224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of Malware IOCs and TTPs Mapping with CoAs 基于coa的恶意软件IOCs提取与https映射
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-13
Shiza Hassan, M. Alam, Tanveer Khan, N. Javaid, Abid Khan
{"title":"Extraction of Malware IOCs and TTPs Mapping with CoAs","authors":"Shiza Hassan, M. Alam, Tanveer Khan, N. Javaid, Abid Khan","doi":"10.1201/9780429424878-13","DOIUrl":"https://doi.org/10.1201/9780429424878-13","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信