-
1
-
-
84942256240
-
Design of IP camera access control protocol by utilizing hierarchical group key
-
August
-
J. Kang, J.-K. Han and J. H. Park, Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key, Symmetry, Vol. 7, No. 3, pp. 1567-1586, August, 2015.
-
(2015)
Symmetry
, vol.7
, Issue.3
, pp. 1567-1586
-
-
Kang, J.1
Han, J.-K.2
Park, J.H.3
-
2
-
-
84989291236
-
Secure HDFS design using group key management system
-
July
-
J. Kang and J. Kim, Secure HDFS Design Using Group Key Management System, Journal of Internet Technology, Vol. 17, No. 4, pp. 729-737, July, 2015.
-
(2015)
Journal of Internet Technology
, vol.17
, Issue.4
, pp. 729-737
-
-
Kang, J.1
Kim, J.2
-
3
-
-
84883040938
-
A secure network for mobile wireless service
-
K. Peng, A Secure Network for Mobile Wireless Service, Journal of Information Processing Systems, Vol. 9, No. 2, pp. 247-258, 2013.
-
(2013)
Journal of Information Processing Systems
, vol.9
, Issue.2
, pp. 247-258
-
-
Peng, K.1
-
4
-
-
84887724123
-
An analysis of security issues for cloud computing
-
February
-
K. Hashizume, D. G. Rosado, E. Fernández-Medina and E. B. Fernandez, An Analysis of Security Issues for Cloud Computing, Journal of Internet Services and Applications, Vol. 4, No. 1, February, 2013, doi: 10.1186/1869-0238-4-5.
-
(2013)
Journal of Internet Services and Applications
, vol.4
, Issue.1
-
-
Hashizume, K.1
Rosado, D.G.2
Fernández-Medina, E.3
Fernandez, E.B.4
-
5
-
-
84907351844
-
A study on advanced persistent threats
-
Aveiro, Portugal
-
P. Chen, L. Desmet and C. Huygens, A Study on Advanced Persistent Threats, 15th IFIP International Conference on Communications and Multimedia Security, Aveiro, Portugal, 2014, pp. 63-72.
-
(2014)
15th IFIP International Conference on Communications and Multimedia Security
, pp. 63-72
-
-
Chen, P.1
Desmet, L.2
Huygens, C.3
-
6
-
-
84901948156
-
Dealing with advanced persistent threats in smart grid ict networks
-
Washington, DC
-
F. Skopik, I. Friedberg and R. Fiedler, Dealing with Advanced Persistent Threats in Smart Grid ICT Networks, 2014 IEEE PES Innovative Smart Grid Technologies Conference, Washington, DC, 2014, doi: 10.1109/ISGT.2014.6816388.
-
(2014)
2014 IEEE PES Innovative Smart Grid Technologies Conference
-
-
Skopik, F.1
Friedberg, I.2
Fiedler, R.3
-
7
-
-
84899421373
-
Advanced persistent threats: Minimising the damage
-
April
-
R. Brewer, Advanced Persistent Threats: Minimising the Damage, Network Security, Vol. 2014, No. 4, pp. 5-9, April, 2014.
-
(2014)
Network Security
, vol.2014
, Issue.4
, pp. 5-9
-
-
Brewer, R.1
-
9
-
-
84948991556
-
Cutting the gordian knot: A look under the hood of ransomware attacks
-
Milan, Italy
-
A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge and E. Kirda, Cutting the Gordian Knot: A Look under the Hood of Ransomware Attacks, 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Milan, Italy, 2015, pp. 3-24.
-
(2015)
12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 3-24
-
-
Kharraz, A.1
Robertson, W.2
Balzarotti, D.3
Bilge, L.4
Kirda, E.5
-
10
-
-
84973117870
-
Design of quantification model for ransom ware prevent
-
September
-
D. Kim and S. Kim, Design of Quantification Model for Ransom Ware Prevent, World Journal of Engineering and Technology, Vol. 3, No. 3, pp. 203- 207, September, 2015.
-
(2015)
World Journal of Engineering and Technology
, vol.3
, Issue.3
, pp. 203-207
-
-
Kim, D.1
Kim, S.2
-
11
-
-
84973154521
-
The effective ransomware prevention technique using process monitoring on android platform
-
March
-
S. Song, B. King and S. Lee, The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform, Mobile Information Systems, Vol. 2016, March, 2016, doi: 10.1155/2016/2946735.
-
(2016)
Mobile Information Systems
, vol.2016
-
-
Song, S.1
King, B.2
Lee, S.3
-
13
-
-
84966424769
-
A predictive zero-day network defense using long-term port-scan recording
-
Florence, Italy
-
C.-N. Kao, Y.-C. Chang, N.-F. Huang, I. Salim S, I.-J. Liao, R.-T. Liu and H.-W. Hung, A Predictive Zero-Day Network Defense Using Long-Term Port-Scan Recording, 2015 IEEE Conference on Communications and Network Security, Florence, Italy, 2015, pp. 695-696.
-
(2015)
2015 IEEE Conference on Communications and Network Security
, pp. 695-696
-
-
Kao, C.-N.1
Chang, Y.-C.2
Huang, N.-F.3
Salim, S.I.4
Liao, I.-J.5
Liu, R.-T.6
Hung, H.-W.7
-
14
-
-
84869403808
-
Before we knew it: An empirical study of zero-day attacks in the real world
-
Raleigh, NC
-
L. Bilge and D. Tudor, Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World, 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 833-844.
-
(2012)
2012 ACM Conference on Computer and Communications Security
, pp. 833-844
-
-
Bilge, L.1
Tudor, D.2
-
15
-
-
84894556085
-
K-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
-
January
-
L. Wang, S. Jajodia, A. Singhal, P. Cheng and S. Noel, K-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities, IEEE Transactions on Dependable and Secure Computing, Vol. 11, No. 1, pp. 30-44, January, 2014.
-
(2014)
IEEE Transactions on Dependable and Secure Computing
, vol.11
, Issue.1
, pp. 30-44
-
-
Wang, L.1
Jajodia, S.2
Singhal, A.3
Cheng, P.4
Noel, S.5
-
17
-
-
84989937188
-
-
FireEye, SPEAR-PHISHING ATTACKS, 2016, https://www2.fireeye.com/rs/fireye/images/fireeye-howstop- spearphishing.pdf
-
(2016)
Spear-Phishing Attacks
-
-
FireEye1
-
18
-
-
84989834765
-
-
US Patent 9258321, February
-
D. B. Amsler, N. Allen, S. Messer and T. Healy, Automated Internet Threat Detection and Mitigation System and Associated Methods, US Patent 9258321, February, 2016.
-
(2016)
Automated Internet Threat Detection and Mitigation System and Associated Methods
-
-
Amsler, D.B.1
Allen, N.2
Messer, S.3
Healy, T.4
-
19
-
-
85003016907
-
IP traceback for flooding attacks on internet threat monitors (itm) using honeypots
-
January
-
K. M. Prasad, A. Reddy and V. Jyothsna, IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM) Using Honeypots, International Journal of Network Security & Its Applications, Vol. 4, No. 1, January, 2012, pp. 13-27.
-
(2012)
International Journal of Network Security & Its Applications
, vol.4
, Issue.1
, pp. 13-27
-
-
Prasad, K.M.1
Reddy, A.2
Jyothsna, V.3
-
20
-
-
84873314646
-
An efficient detection of flooding attacks to internet threat monitors (itm) using entropy variations under low traffic
-
Coimbatore, India
-
K. M. Prasad, A. R. M. Reddy and K. V. Rao, An Efficient Detection of Flooding Attacks to Internet Threat Monitors (ITM) Using Entropy Variations under Low Traffic, 2012 Third International Conference on Computing Communication & Networking Technologies, Coimbatore, India, 2012, pp. 1-11.
-
(2012)
2012 Third International Conference on Computing Communication & Networking Technologies
, pp. 1-11
-
-
Prasad, K.M.1
Reddy, A.R.M.2
Rao, K.V.3
-
22
-
-
84947445554
-
Identifying phishing threats in government web services
-
February
-
Y. Oh and T. Obi, Identifying Phishing Threats in Government Web Services, International Journal of Information and Network Security, Vol. 2, No. 1, pp. 32-43, February, 2013.
-
(2013)
International Journal of Information and Network Security
, vol.2
, Issue.1
, pp. 32-43
-
-
Oh, Y.1
Obi, T.2
-
23
-
-
84978945563
-
Web user' knowledge and their behavior towards security threats and vulnerabilities
-
Kuala Lumpur, Malaysia
-
A. A. Aldossary and A. M. Zeki, Web User' Knowledge and Their Behavior towards Security Threats and Vulnerabilities, 2015 4th International Conference on Advanced Computer Science Applications and Technologies, Kuala Lumpur, Malaysia, 2015, pp. 256-260.
-
(2015)
2015 4th International Conference on Advanced Computer Science Applications and Technologies
, pp. 256-260
-
-
Aldossary, A.A.1
Zeki, A.M.2
-
24
-
-
84923247660
-
Virtual network security: Threats, countermeasures, and challenges
-
January
-
L. R. Bays, R. R. Oliveira, M. P. Barcellos, L. P. Gaspary and E. R. M. Madeira, Virtual Network Security: Threats, Countermeasures, and Challenges, Journal of Internet Services and Applications, Vol. 6, No. 1, January, 2015, doi: 10.1186/s13174-014- 0015-z.
-
Journal of Internet Services and Applications
, vol.6
, Issue.1
, pp. 2015
-
-
Bays, L.R.1
Oliveira, R.R.2
Barcellos, M.P.3
Gaspary, L.P.4
Madeira, E.R.M.5
-
25
-
-
84944443432
-
Cooperation-aware vanet clouds: Providing secure cloud services to vehicular ad hoc networks
-
March
-
R. Hussain and H. Oh, Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks, Journal of Information Processing Systems, Vol. 10, No. 1, pp. 103-118, March, 2014.
-
(2014)
Journal of Information Processing Systems
, vol.10
, Issue.1
, pp. 103-118
-
-
Hussain, R.1
Oh, H.2
-
26
-
-
84875654471
-
-
McAfee, Mobile Threat Report, http://www. mcafee.com/us/resources/reports/rp-mobile-threatreport- 2016.pdf
-
Mobile Threat Report
-
-
McAfee1
-
27
-
-
84989900408
-
Security considerations for a connected car
-
June
-
J. W. Joo, J. K. Lee and J. H. Park, Security Considerations for a Connected Car, Journal of Convergence, Vol. 6, No. 2, pp. 1-9, June, 2015.
-
(2015)
Journal of Convergence
, vol.6
, Issue.2
, pp. 1-9
-
-
Joo, J.W.1
Lee, J.K.2
Park, J.H.3
-
28
-
-
84935510273
-
A virtual laboratory to practice mobile wireless sensor networks: A case study on energy efficient and safe weighted clustering algorithm
-
June
-
A. Dahane, N.-E. Berrached and A. Loukil, A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm, Journal of Information Processing Systems, Vol. 11, No. 2, pp. 205-228, June, 2015.
-
(2015)
Journal of Information Processing Systems
, vol.11
, Issue.2
, pp. 205-228
-
-
Dahane, A.1
Berrached, N.-E.2
Loukil, A.3
-
29
-
-
84989840791
-
Certificateless based public key infrastructure using a dnssec
-
September
-
H. Im, J. Kang and J. H. Park, Certificateless Based Public Key Infrastructure Using a DNSSEC, Journal of Convergence, Vol. 6, No. 3, pp. 26-33, September, 2015.
-
(2015)
Journal of Convergence
, vol.6
, Issue.3
, pp. 26-33
-
-
Im, H.1
Kang, J.2
Park, J.H.3
-
30
-
-
84989864369
-
Efficiency of lea compared with aes
-
September
-
T. Kwon, J. Lee, H. Choi, O. Yi and S. Ju, Efficiency of LEA compared with AES, Journal of Convergence, Vol. 6, No. 3, pp. 16-25, September, 2015.
-
(2015)
Journal of Convergence
, vol.6
, Issue.3
, pp. 16-25
-
-
Kwon, T.1
Lee, J.2
Choi, H.3
Yi, O.4
Ju, S.5
-
32
-
-
84924940631
-
A survey on communication technologies and requirements for internet of electric vehicles
-
December
-
I. S. Bayram and I. Papapanagiotou, A Survey on Communication Technologies and Requirements for Internet of Electric Vehicles, EURASIP Journal on Wireless Communications and Networking, Vol. 2014, No. 1, December, 2014, doi: 10.1186/1687-1499- 2014-223.
-
(2014)
EURASIP Journal on Wireless Communications and Networking
, vol.2014
, Issue.1
-
-
Bayram, I.S.1
Papapanagiotou, I.2
-
34
-
-
84897697432
-
Mass of a black hole firewall
-
March
-
M. A. Abramowicz, W. Kluźniak and J.-P. Lasota, Mass of a Black Hole Firewall, Physical Review Letters, Vol. 112, No. 9, March, 2014, doi: 10.1103/PhysRevLett.112.091301.
-
(2014)
Physical Review Letters
, vol.112
, Issue.9
-
-
Abramowicz, M.A.1
Kluźniak, W.2
Lasota, J.-P.3
-
35
-
-
84858632756
-
Detecting and resolving firewall policy anomalies
-
May-June
-
H. Hu, G.-J. Ahn and K. Kulkarni, Detecting and Resolving Firewall Policy Anomalies, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 3, pp. 318-331, May-June, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 318-331
-
-
Hu, H.1
Ahn, G.-J.2
Kulkarni, K.3
-
36
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor networks
-
May
-
I. Butun, S. D. Morgera and R. Sankar, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, pp. 266-282, May, 2014.
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.1
, pp. 266-282
-
-
Butun, I.1
Morgera, S.D.2
Sankar, R.3
-
37
-
-
84868112157
-
Eaack - A secure intrusion-detection system for manets
-
March
-
E. M. Shakshuki, N. Kang and T. R. Sheltami. EAACK - A Secure Intrusion-Detection System for MANETs, IEEE Transactions on Industrial Electronics, Vol. 60, No. 3, pp. 1089-1098, March, 2013.
-
(2013)
IEEE Transactions on Industrial Electronics
, vol.60
, Issue.3
, pp. 1089-1098
-
-
Shakshuki, E.M.1
Kang, N.2
Sheltami, T.R.3
-
38
-
-
84875222968
-
Repids: A multi tier real-time payload-based intrusion detection system
-
February
-
A. Jamdagni, Z. Tan, X. He, P. Nanda and R. P. Liu, RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System, Computer Networks, Vol. 57, No. 3, pp. 811-824, February, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.3
, pp. 811-824
-
-
Jamdagni, A.1
Tan, Z.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
39
-
-
84885205587
-
Snortflow: A openflow-based intrusion prevention system in cloud environment
-
Salt Lake City, UT
-
T. Xing, D. Huang, L. Xu, C.-J. Chung and P. Khatkar, Snortflow: A Openflow-Based Intrusion Prevention System in Cloud Environment, 2013 Second GENI Research and Educational Experiment Workshop, Salt Lake City, UT, 2013, pp. 89-92.
-
(2013)
2013 Second GENI Research and Educational Experiment Workshop
, pp. 89-92
-
-
Xing, T.1
Huang, D.2
Xu, L.3
Chung, C.-J.4
Khatkar, P.5
-
40
-
-
84906776422
-
Deployment of intrusion prevention system based on software defined networking
-
Guilin, China
-
L. Zhang, G. Shou, Y. Hu and Z. Guo, Deployment of Intrusion Prevention System Based on Software Defined Networking, 2013 15th IEEE International Conference on Communication Technology, Guilin, China, 2013, pp. 26-31.
-
(2013)
2013 15th IEEE International Conference on Communication Technology
, pp. 26-31
-
-
Zhang, L.1
Shou, G.2
Hu, Y.3
Guo, Z.4
|