-
3
-
-
33646563519
-
Hackers profiled who are they and what are their motivations?
-
R. Barber Hackers profiled who are they and what are their motivations? Comput Fraud Secur 2001 2 2001 14 17
-
(2001)
Comput Fraud Secur
, vol.2001
, Issue.2
, pp. 14-17
-
-
Barber, R.1
-
4
-
-
84861990805
-
Network anomaly detection: Comparison and real-time issues
-
Springer
-
V. Bartoš, and M. Žádník Network anomaly detection: comparison and real-time issues Dependable networks and services 2012 Springer 118 121
-
(2012)
Dependable Networks and Services
, pp. 118-121
-
-
Bartoš, V.1
Žádník, M.2
-
5
-
-
84899421373
-
Advanced persistent threats: Minimising the damage
-
R. Brewer Advanced persistent threats: minimising the damage Netw Secur 2014 4 2014 5 9
-
(2014)
Netw Secur
, vol.2014
, Issue.4
, pp. 5-9
-
-
Brewer, R.1
-
6
-
-
84872817196
-
Spear-phishing: How to spot and mitigate the menace
-
T. Caldwell Spear-phishing: how to spot and mitigate the menace Comput Fraud Secur 2013 1 2013 11 16
-
(2013)
Comput Fraud Secur
, vol.2013
, Issue.1
, pp. 11-16
-
-
Caldwell, T.1
-
8
-
-
0023294428
-
An intrusion-detection model
-
D.E. Denning An intrusion-detection model Softw Eng IEEE Trans 2 1987 222 232
-
(1987)
Softw Eng IEEE Trans
, vol.2
, pp. 222-232
-
-
Denning, D.E.1
-
9
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez Anomaly-based network intrusion detection: techniques, systems and challenges Comput Secur 28 12 2009 18 28
-
(2009)
Comput Secur
, vol.28
, Issue.12
, pp. 18-28
-
-
Garca-Teodoro, P.1
Daz-Verdejo, J.2
MacI-Fernndez, G.3
Vzquez, E.4
-
10
-
-
4243096135
-
The domino effect of password reuse
-
B. Ives, K.R. Walsh, and H. Schneider The domino effect of password reuse Commun ACM 47 4 2004 75 78
-
(2004)
Commun ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
11
-
-
84888315965
-
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
-
G. Kim, S. Lee, and S. Kim A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Expert Syst Appl 41 4, Part 2 2014 1690-1700
-
(2014)
Expert Syst Appl
, vol.41
, Issue.4
, pp. 1690-1700
-
-
Kim, G.1
Lee, S.2
Kim, S.3
-
12
-
-
33750374206
-
A taxonomy and comparison of computer security incidents from the commercial and government sectors
-
M. Kjaerland A taxonomy and comparison of computer security incidents from the commercial and government sectors Comput Secur 25 7 2006 522 538
-
(2006)
Comput Secur
, vol.25
, Issue.7
, pp. 522-538
-
-
Kjaerland, M.1
-
13
-
-
84873989630
-
The cybercrime ecosystem: Online innovation in the shadows?
-
Future-Oriented Technology Analysis
-
E. Kraemer-Mbula, P. Tang, and H. Rush The cybercrime ecosystem: online innovation in the shadows? Technol Forecast Soc Change 80 3 2013 541 555 Future-Oriented Technology Analysis
-
(2013)
Technol Forecast Soc Change
, vol.80
, Issue.3
, pp. 541-555
-
-
Kraemer-Mbula, E.1
Tang, P.2
Rush, H.3
-
16
-
-
84955353419
-
-
McAfee
-
McAfee Labs and McAfee Foundstone Professional Services Protecting your critical assets 2010 McAfee
-
(2010)
Protecting Your Critical Assets
-
-
-
17
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
55:1-55:29
-
R. Mitchell, and I.R. Chen A survey of intrusion detection techniques for cyber-physical systems ACM Comput Surv 46 4 2014 55:1-55:29
-
(2014)
ACM Comput Surv
, vol.46
, Issue.4
-
-
Mitchell, R.1
Chen, I.R.2
-
18
-
-
84893764188
-
The internet of things: Do more devices mean more risks?
-
M. O'Neill The internet of things: do more devices mean more risks? Comput Fraud Secur 2014 1 2014 16 17
-
(2014)
Comput Fraud Secur
, vol.2014
, Issue.1
, pp. 16-17
-
-
O'Neill, M.1
-
19
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput Netw 51 12 2007 3448 3470
-
(2007)
Comput Netw
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
24
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
R. Sommer, and V. Paxson Outside the closed world: on using machine learning for network intrusion detection Security and Privacy (SP), 2010 IEEE Symposium on 2010 305 316 10.1109/SP.2010.25
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
25
-
-
84876697251
-
Crimeware-as-a-servicea survey of commoditized crimeware in the underground market
-
A.K. Sood, and R.J. Enbody Crimeware-as-a-servicea survey of commoditized crimeware in the underground market Int J Crit Infrastructure Prot 6 1 2013 28 38
-
(2013)
Int J Crit Infrastructure Prot
, vol.6
, Issue.1
, pp. 28-38
-
-
Sood, A.K.1
Enbody, R.J.2
-
26
-
-
84893737200
-
The gaping hole in our security defences
-
J. Steer The gaping hole in our security defences Comput Fraud Secur 2014 1 2014 17 20
-
(2014)
Comput Fraud Secur
, vol.2014
, Issue.1
, pp. 17-20
-
-
Steer, J.1
-
27
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
C. Tankard Advanced persistent threats and how to monitor and deter them Netw Secur 2011 8 2011 16 19
-
(2011)
Netw Secur
, vol.2011
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
28
-
-
81755187694
-
Apts: A poorly understood challenge
-
G. Thomson Apts: a poorly understood challenge Netw Secur 2011 11 2011 9 11
-
(2011)
Netw Secur
, vol.2011
, Issue.11
, pp. 9-11
-
-
Thomson, G.1
-
29
-
-
0043166339
-
Anomaly detection in ip networks
-
M. Thottan, and C. Ji Anomaly detection in ip networks Signal Process IEEE Trans 51 8 2003 2191 2204
-
(2003)
Signal Process IEEE Trans
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
30
-
-
84885188079
-
From information security to cyber security
-
Cybercrime in the Digital Economy
-
R. von Solms, and J. van Niekerk From information security to cyber security Comput Secur 38 0 2013 97 102 Cybercrime in the Digital Economy
-
(2013)
Comput Secur
, vol.38
, Issue.0
, pp. 97-102
-
-
Von Solms, R.1
Van Niekerk, J.2
-
31
-
-
6344248893
-
Multi-events analysis for anomaly intrusion detection
-
IEEE
-
J. Yin, G. Zhang, Y.Q. Chen, and X.L. Fan Multi-events analysis for anomaly intrusion detection Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on volume 2 2004 IEEE 1298 1303
-
(2004)
Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on
, vol.2
, pp. 1298-1303
-
-
Yin, J.1
Zhang, G.2
Chen, Y.Q.3
Fan, X.L.4
-
32
-
-
84908269313
-
A survey of anomaly intrusion detection techniques
-
Y. Yu A survey of anomaly intrusion detection techniques J Comput Sci Coll 28 1 2012 9 17
-
(2012)
J Comput Sci Coll
, vol.28
, Issue.1
, pp. 9-17
-
-
Yu, Y.1
|