ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Information Securityx
条 记 录,以下是1-10
视图:
排序:
The Role of Social Engineering in Cybersecurity and Its Impact
《Journal of Information Security》2022年第4期363-379,共17页Bandar S. Almutairi Abdurahman Alghamdi 
An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. T...
关键词:CYBERSECURITY ATTACKS Social Engineering SECURITY Awareness of Cybersecurity 
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
《Journal of Information Security》2022年第4期294-311,共18页Fauziyah Fauziyah Zhaosun Wang Gabriel Joy 
Electronic Commerce (E-Commerce) was created to help expand the market share network through the internet without the boundaries of space and time. However, behind all the benefits obtained, E-Commerce also raises the...
关键词:Knowledge Management Cyber Security Computer Security Incident Response Team (CSIRT) 
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems被引量:1
《Journal of Information Security》2021年第3期189-211,共23页Faisal Nabi Jianming Yong Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors,...
关键词:Business Logic Design Flaws Components Integration Flaws E-Commerce System Assurance & Security Model Based Design Business Logic Attacks Attack Pattern 
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
《Journal of Information Security》2021年第1期1-33,共33页Eloi De Chérisey Sylvain Guilley Olivier Rioul Darshana Jayasinghe 
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh...
关键词:Timing Attacks Profiling Attacks Dirichlet Priors Success Rates 
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network被引量:1
《Journal of Information Security》2019年第3期103-116,共14页Akinjide A. Akinola Adeyemi A. Adekoya Ayoade O. Kuye Abiodun Ayodeji 
This paper presents the attack tree modeling technique of quantifying cyber-attacks on a hypothetical school network system. Attack trees are constructed by decomposing the path in the network system where attacks are...
关键词:Cyber-Attack Quantitative VULNERABILITY Assessment ATTACK Trees RETURN on ATTACK Countermeasures 
Security Analysis of Subspace Network Coding
《Journal of Information Security》2018年第1期85-94,共10页Yantao Liu Yasser Morgan 
This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eavesdropper guessed the source message successfully. With the...
关键词:NETWORK Security WIRETAP ATTACKS SUBSPACE Code NETWORK Coding 
Security and Privacy Challenges in Cyber-Physical Systems被引量:1
《Journal of Information Security》2017年第4期285-295,共11页Fahd AlDosari 
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the qua...
关键词:SECURITY Cyber-Physical SYSTEMS SIDE CHANNEL ATTACKS 
Do ICMP Security Attacks Have Same Impact on Servers?
《Journal of Information Security》2017年第3期274-283,共10页Ganesh Reddy Gunnam Sanjeev Kumar 
There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer system...
关键词:DDoS Security ATTACKS ICMP Based Cyber ATTACKS Mac SERVER OS Windows SERVER OS 
Evaluation of Microsoft Windows Servers 2008 &2003 against Cyber Attacks
《Journal of Information Security》2015年第2期155-160,共6页Sanjeev Kumar Senior Member Raja Sekhar Reddy Gade 
Distributed Denial of Service (DDoS) is known to compromise availability of Information Systems today. Widely deployed Microsoft’s Windows 2003 & 2008 servers provide some built-in protection against common Distribut...
关键词:CYBER Warfare Distributed DENIAL of Service ATTACKS TCP/SYN Flood Processor RESOURCE EXHAUSTION Memory RESOURCE EXHAUSTION 
Study of the Security Enhancements in Various E-Mail Systems
《Journal of Information Security》2015年第1期1-11,共11页Afnan S. Babrahem Eman T. Alharbi Aisha M. Alshiky Saja S. Alqurashi Jayaprakash Kar 
E-mail security becomes critical issue to research community in the field of information security. Several solutions and standards have been fashioned according to the recent security requirements in order to enhance ...
关键词:E-MAIL Security Enhancement MALWARE ATTACKS AUTHENTICATION INTEGRITY 
检索报告 对象比较 聚类工具 使用帮助 返回顶部