Browse All Reviews
Computing Milieux (K)
Management Of Computing And Information Systems (K.6)
Security and Protection (K.6.5)
> Unauthorized Access (K.6.5...)
All Media Types
1-10 of 116 Reviews about "
Unauthorized Access (K.6.5...)
The blueprint: hacking/Python: 2 books in 1
CyberPunk Architects ., CreateSpace Independent Publishing Platform, Charleston, SC, 2017. 150 pp. Type: Book (978-1-545444-19-1)
This “beginner’s guide to everything you need to know”--as the authors call it--is anything but that. It seems to be randomly copy and pasted from Wikipedia and other sources, and is outdated and poorly written. What is...
Aug 15 2018
Automatic extraction of indicators of compromise for web applications
Catakoglu O., Balduzzi M., Balzarotti D. WWW 2016 (Proceedings of the 25th International Conference on the World Wide Web, Montréal, Québec, Canada, Apr 11-15, 2016) 333-343, 2016. Type: Proceedings
Sep 8 2016
Fraud and financial crime detection model using malware forensics
Kim A., Kim S., Park W., Lee D. Multimedia Tools and Applications 68(2): 479-496, 2014. Type: Article
Fraud involving financial services transactions is on the rise. There are multiple reasons fraud is increasingly a concern. First, the volume of transactions is growing by double digits annually and the transaction volume is huge. In 2012, e-comme...
Nov 12 2014
The Office demon: Minos
Dechaux J. Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013. Type: Article
An instruction manual on the use of a program for injecting malicious payloads into Office documents, this paper is interesting but not useful to defenders of computer installations....
Jul 14 2014
A model-based approach to self-protection in computing system
Chen Q., Abdelwahed S., Erradi A. CAC 2013 (Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, Miami, FL, Aug 5-9, 2013) 1-10, 2013. Type: Proceedings
An autonomous security management system that aims to detect, analyze, and react to attacks in an automated fashion is the focus of this paper....
Dec 16 2013
Theorem-based, data-driven, cyber event detection
Hively L., McDonald J. CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Jan 8-10, 2013) 1-4, 2013. Type: Proceedings
The design of intrusion detection systems remains a viable area of research, despite their existing positive effects on cyberspace protection in the literature [1,2,3]. Phase-space analysis techniques have been successful in sensing peculiar situa...
Aug 22 2013
Wireless reconnaissance in penetration testing
Neely M., Hamerstone A., Sanyk C., Syngress Publishing, Amsterdam, the Netherlands, 2012. 226 pp. Type: Book (978-1-597497-31-2)
The title of this book is somewhat misleading. Here, wireless reconnaissance is not about Wi-Fi, and penetration testing is not about hacking computer systems. Instead, the book is about listening to the wireless communications of police, emergenc...
Jul 22 2013
Hands-on ethical hacking and network defense
Simpson M., Backman K., Corley J., Course Technology Press, Boston, MA, 2013. 464 pp. Type: Book (978-1-133935-61-2)
Network security is of great interest to students, researchers, and government officials, and of course to people who want to extract information for pleasure or money. Hacking is a means to exploit holes in software via inspection, brute-force te...
Jul 12 2013
For some eyes only: protecting online information sharing
Beato F., Ion I., Čapkun S., Preneel B., Langheinrich M. CODASPY 2013 (Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, Feb 18-20, 2013) 1-12, 2013. Type: Proceedings
This paper addresses an interesting data security and privacy issue on online sharing platforms. The authors propose a carefully designed system with strong user-side encryption. A notable feature of this system is that the ciphertext that is tran...
Jul 12 2013
Attack models and scenarios for networked control systems
Teixeira A., Pérez D., Sandberg H., Johansson K. HiCoNS 2012 (Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China, Apr 17-18, 2012) 55-64, 2012. Type: Proceedings
In this paper, Teixeira et al. address cybersecurity issues for networked control systems. Such systems are of great importance to our modern technology infrastructure and affect safety, health, and essential utilities. A model is defined, analyze...
Aug 23 2012
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.