首页 > 最新文献

Computer and Cyber Security最新文献

英文 中文
Botnet Behavior and Detection Techniques: A Review 僵尸网络行为和检测技术综述
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-9
Ammar Almomani, O. Dorgham, Mohammad Alauthman, M. Al-Refai, N. Aslam
{"title":"Botnet Behavior and Detection Techniques: A Review","authors":"Ammar Almomani, O. Dorgham, Mohammad Alauthman, M. Al-Refai, N. Aslam","doi":"10.1201/9780429424878-9","DOIUrl":"https://doi.org/10.1201/9780429424878-9","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124007886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms DOM-Guard:在基于移动云平台的HTML5 Web应用程序中击败基于dom的XSS蠕虫注入
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-16
B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta
{"title":"DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms","authors":"B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta","doi":"10.1201/9780429424878-16","DOIUrl":"https://doi.org/10.1201/9780429424878-16","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk 网络安全预测问题:应用计量经济学技术衡量IT风险
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-3
Baidyanath Biswas, S. Patra
{"title":"Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk","authors":"Baidyanath Biswas, S. Patra","doi":"10.1201/9780429424878-3","DOIUrl":"https://doi.org/10.1201/9780429424878-3","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overview of Smartphone Security: Attack and Defense Techniques 智能手机安全概述:攻击和防御技术
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-10
Diksha Goel, A. Jain
{"title":"Overview of Smartphone Security: Attack and Defense Techniques","authors":"Diksha Goel, A. Jain","doi":"10.1201/9780429424878-10","DOIUrl":"https://doi.org/10.1201/9780429424878-10","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114535703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior 上下文感知系统:保护敏感信息和控制网络行为
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-1
Alberto Huertas Celdrán, M. Pérez, F. J. G. Clemente, G. Pérez
{"title":"Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior","authors":"Alberto Huertas Celdrán, M. Pérez, F. J. G. Clemente, G. Pérez","doi":"10.1201/9780429424878-1","DOIUrl":"https://doi.org/10.1201/9780429424878-1","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compendium of Security Issues in Wireless Sensor Networks 无线传感器网络安全问题汇编
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-23
Jasminder Kaur Sandhu, A. Verma, P. Rana
{"title":"A Compendium of Security Issues in Wireless Sensor Networks","authors":"Jasminder Kaur Sandhu, A. Verma, P. Rana","doi":"10.1201/9780429424878-23","DOIUrl":"https://doi.org/10.1201/9780429424878-23","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse 数字时代的网络空间和网络安全:当代安全话语中不断演变的关注
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-4
S. devi, Mohd. Aarif Rather
{"title":"Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse","authors":"S. devi, Mohd. Aarif Rather","doi":"10.1201/9780429424878-4","DOIUrl":"https://doi.org/10.1201/9780429424878-4","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective 基于用户视角的在线社交网络安全问题与挑战
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-22
Somya Ranjan Sahoo, B. Gupta
{"title":"Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective","authors":"Somya Ranjan Sahoo, B. Gupta","doi":"10.1201/9780429424878-22","DOIUrl":"https://doi.org/10.1201/9780429424878-22","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Credit Scoring Using Birds Swarm Optimization 使用蜂群优化的信用评分
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-19
D. Edla, G. Pedunayak, K. Tejaswini, K. Hareesh, Ramalingaswamy Cheruku
{"title":"Credit Scoring Using Birds Swarm Optimization","authors":"D. Edla, G. Pedunayak, K. Tejaswini, K. Hareesh, Ramalingaswamy Cheruku","doi":"10.1201/9780429424878-19","DOIUrl":"https://doi.org/10.1201/9780429424878-19","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115919224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of Malware IOCs and TTPs Mapping with CoAs 基于coa的恶意软件IOCs提取与https映射
Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-13
Shiza Hassan, M. Alam, Tanveer Khan, N. Javaid, Abid Khan
{"title":"Extraction of Malware IOCs and TTPs Mapping with CoAs","authors":"Shiza Hassan, M. Alam, Tanveer Khan, N. Javaid, Abid Khan","doi":"10.1201/9780429424878-13","DOIUrl":"https://doi.org/10.1201/9780429424878-13","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Computer and Cyber Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1