Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5) > Unauthorized Access (K.6.5...)  
 
Options:
 
  1-10 of 24 Reviews about "Unauthorized Access (K.6.5...)": Date Reviewed
  The Office demon: Minos
Dechaux J. Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013.  Type: Article

An instruction manual on the use of a program for injecting malicious payloads into Office documents, this paper is interesting but not useful to defenders of computer installations....

Jul 14 2014
  Theorem-based, data-driven, cyber event detection
Hively L., McDonald J.  CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Jan 8-10, 2013) 1-4, 2013.  Type: Proceedings

The design of intrusion detection systems remains a viable area of research, despite their existing positive effects on cyberspace protection in the literature [1,2,3]. Phase-space analysis techniques have been successful in sensing pe...

Aug 22 2013
  Attack models and scenarios for networked control systems
Teixeira A., Pérez D., Sandberg H., Johansson K.  HiCoNS 2012 (Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China, Apr 17-18, 2012) 55-64, 2012.  Type: Proceedings

In this paper, Teixeira et al. address cybersecurity issues for networked control systems. Such systems are of great importance to our modern technology infrastructure and affect safety, health, and essential utilities. A model is defi...

Aug 23 2012
  The pervasive trust foundation for security in next generation networks
Lilien L., Al-Alawneh A., Ben Othmane L.  NSPW 2010 (Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, Sep 21-23, 2010) 129-142, 2010.  Type: Proceedings

In this paper, Lilien et al. propose the pervasive trust foundation (PTF), a new paradigm for the security of next-generation networks (NGNs). The paper reviews and surveys existing literature and terminology related to the trust aspec...

Apr 13 2011
  A statistical analysis of attack data to separate attacks
Cukier M., Berthier R., Panjwani S., Tan S.  Dependable systems and networks (Proceedings of the International Conference on Dependable Systems and Networks (DSN’06),Jun 25-28, 2006) 383-392, 2006.  Type: Proceedings

When categorizing attacks provides insight on how attacks can be defended against, the work to separate attacks becomes crucial. In this research, a test bed is configured to collect data used in the attacks, such as port scans, Intern...

May 16 2007
  Extrusion detection: security monitoring for internal intrusions
Bejtlich R., Addison-Wesley Professional, 2005. 416 pp.  Type: Book (9780321349965)

Although most readers are probably familiar with the term intrusion detection and its general underlying function, they are probably not familiar with extrusion detection, a new concept that may become an emerging key technology in net...

Feb 10 2006
  Computer forensics: computer crime scene investigation (Networking Series)
Vacca J., Charles River Media, Inc., Rockland, MA, 2005. 832 pp.  Type: Book (9781584503897)

Computer forensics is a domain of growing importance, similar to all security-related services, and the number of new books in this area is increasing rapidly....

Dec 7 2005
  The hacker’s handbook: the strategy behind breaking intro and defending networks
Aitel D., Young S. (ed), CRC Press, Inc., Boca Raton, FL, 2003. 896 pp.  Type: Book (9780849308888)

Is it possible to write a handbook about an activity requiring creativity, endurance, patience, and intuition? This book shows that, to some extent, a practical and recipe-like approach to hacking (where the meaning of “hacke...

Nov 28 2005
  Extreme exploits: advanced defenses against hardcore hacks
Oppleman V., Friedrichs O., Watson B., McGraw-Hill Osborne Media, Columbus, OH, 2005. 448 pp.  Type: Book (9780072259551)

Securing a network is a multilayer process. This book addresses network security from an operational viewpoint, providing pragmatic coverage of a comprehensive arsenal for defense against the most common attacks encountered in real-lif...

Nov 8 2005
  Intrusion prevention and active response: deploying network and host IPS
Rash M., Orebaugh A., Clark G., Pinkard B., Babbin J., Syngress Publishing, New York, NY, 2005. 424 pp.  Type: Book (9781932266474)

“Intrusion prevention” is one of the most popular security buzz phrases of the last few years. There has been a limited amount of literature published discussing the prevention side of intrusion detection, b...

Oct 17 2005
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy