Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5) > Unauthorized Access (K.6.5...)  
  1-10 of 116 Reviews about "Unauthorized Access (K.6.5...)": Date Reviewed
  The blueprint: hacking/Python: 2 books in 1
CyberPunk Architects .,  CreateSpace Independent Publishing Platform, Charleston, SC, 2017. 150 pp. Type: Book (978-1-545444-19-1)

This “beginner’s guide to everything you need to know”--as the authors call it--is anything but that. It seems to be randomly copy and pasted from Wikipedia and other sources, and is outdated and poorly written. What is...

Aug 15 2018
   Automatic extraction of indicators of compromise for web applications
Catakoglu O., Balduzzi M., Balzarotti D.  WWW 2016 (Proceedings of the 25th International Conference on the World Wide Web, Montréal, Québec, Canada,  Apr 11-15, 2016) 333-343, 2016. Type: Proceedings

Small, harmless scripts can help identify compromised websites that have remained undetected for years. By analyzing external components used by attackers to make a compromised page run smoothly, for example JavaScript libraries or scripts to impl...

Sep 8 2016
  Fraud and financial crime detection model using malware forensics
Kim A., Kim S., Park W., Lee D.  Multimedia Tools and Applications 68(2): 479-496, 2014. Type: Article

Fraud involving financial services transactions is on the rise. There are multiple reasons fraud is increasingly a concern. First, the volume of transactions is growing by double digits annually and the transaction volume is huge. In 2012, e-comme...

Nov 12 2014
  The Office demon: Minos
Dechaux J.  Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013. Type: Article

An instruction manual on the use of a program for injecting malicious payloads into Office documents, this paper is interesting but not useful to defenders of computer installations....

Jul 14 2014
  A model-based approach to self-protection in computing system
Chen Q., Abdelwahed S., Erradi A.  CAC 2013 (Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, Miami, FL,  Aug 5-9, 2013) 1-10, 2013. Type: Proceedings

An autonomous security management system that aims to detect, analyze, and react to attacks in an automated fashion is the focus of this paper....

Dec 16 2013
  Theorem-based, data-driven, cyber event detection
Hively L., McDonald J.  CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN,  Jan 8-10, 2013) 1-4, 2013. Type: Proceedings

The design of intrusion detection systems remains a viable area of research, despite their existing positive effects on cyberspace protection in the literature [1,2,3]. Phase-space analysis techniques have been successful in sensing peculiar situa...

Aug 22 2013
  Wireless reconnaissance in penetration testing
Neely M., Hamerstone A., Sanyk C.,  Syngress Publishing, Amsterdam, the Netherlands, 2012. 226 pp. Type: Book (978-1-597497-31-2)

The title of this book is somewhat misleading. Here, wireless reconnaissance is not about Wi-Fi, and penetration testing is not about hacking computer systems. Instead, the book is about listening to the wireless communications of police, emergenc...

Jul 22 2013
  Hands-on ethical hacking and network defense
Simpson M., Backman K., Corley J.,  Course Technology Press, Boston, MA, 2013. 464 pp. Type: Book (978-1-133935-61-2)

Network security is of great interest to students, researchers, and government officials, and of course to people who want to extract information for pleasure or money. Hacking is a means to exploit holes in software via inspection, brute-force te...

Jul 12 2013
  For some eyes only: protecting online information sharing
Beato F., Ion I., Čapkun S., Preneel B., Langheinrich M.  CODASPY 2013 (Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX,  Feb 18-20, 2013) 1-12, 2013. Type: Proceedings

This paper addresses an interesting data security and privacy issue on online sharing platforms. The authors propose a carefully designed system with strong user-side encryption. A notable feature of this system is that the ciphertext that is tran...

Jul 12 2013
  Attack models and scenarios for networked control systems
Teixeira A., Pérez D., Sandberg H., Johansson K.  HiCoNS 2012 (Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China,  Apr 17-18, 2012) 55-64, 2012. Type: Proceedings

In this paper, Teixeira et al. address cybersecurity issues for networked control systems. Such systems are of great importance to our modern technology infrastructure and affect safety, health, and essential utilities. A model is defined, analyze...

Aug 23 2012
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy