Privacy and security gaps in mitigating Cyber crime: The review

作者: Amna Saad , Ahmad Roshidi Amran , Ijlal Ibrahim Afif , Ahmad Hariri Zolkeple , Aidy Izzuddin Ahmad Said

DOI: 10.1109/ISAMSR.2016.7810009

关键词: Security through obscuritySecurity servicePolitical scienceComputer securityComputer security modelSecurity information and event managementCloud computing securityNetwork security policyInternet privacyAsset (computer security)Security convergence

摘要: Our motivation for this study is to provide new information a researcher based on our field of study: Networking Systems. This because Cyber crime becoming very widespread and it imperative improve measures used counteract such threats. There are various research gaps awareness cyber security, different methods in enhancing troubleshooting network security. area can offer many opportunities which justice be served, creating awareness, making space more secure business niche Hence, Network Security, we read through 24 papers published between 2008 2014. These documents were retrieved online from CAIDA IEEE, along with other computer journals articles. The then summarized into 7 help enlighten the topic Security. Therefore, researchers take initiatives come up solutions issues raised paper.

参考文章(23)
Zhou Jing, The Analysis of XML Technology in Network Security information processing and trusted computing. pp. 701- 704 ,(2010) , 10.1109/IPTC.2010.18
Song-song Lu, Xiao-feng Wang, Li Mao, Network security situation awareness based on network simulation 2014 IEEE Workshop on Electronics, Computer and Applications (IWECA). pp. 512- 517 ,(2014) , 10.1109/IWECA.2014.6845671
Qingfeng Cheng, Siqi Lu, Jinhua Zhao, Security weakness of two identity-based multiple key agreement protocols Information and Communications Technologies (ICT 2014), 2014 International Conference on. pp. 1- 5 ,(2014) , 10.1049/CP.2014.0623
Chun-Hsin Wang, Da Chun Chang, Heterogeneous tracers against DDoS attacks international conference on communication technology. pp. 723- 727 ,(2011) , 10.1109/ICCT.2011.6157971
Qi Xie, Mengjie Bao, Na Dong, Bin Hu, Duncan S. Wong, Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks international symposium on biometrics and security technologies. pp. 124- 129 ,(2013) , 10.1109/ISBAST.2013.23
Sara Bakkali, Hafssa Benaboud, Mouad Ben Mamoun, Security problems in BGP: An overview 2013 National Security Days (JNS3). pp. 1- 5 ,(2013) , 10.1109/JNS3.2013.6595458
Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Laurence T. Yang, Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks IEEE Transactions on Industrial Electronics. ,vol. 60, pp. 5348- 5354 ,(2013) , 10.1109/TIE.2012.2218562
Erin Kenneally, Michael Bailey, Cyber-security research ethics dialogue & strategy workshop acm special interest group on data communication. ,vol. 44, pp. 76- 79 ,(2014) , 10.1145/2602204.2602217
Abdur Rahim Choudhary, Alan Sekelsky, Securing IPv6 network infrastructure: A new security model ieee international conference on technologies for homeland security. pp. 500- 506 ,(2010) , 10.1109/THS.2010.5654971
Wenqiong Yu, The Network Security Issue of 3G Mobile Communication System Research 2010 International Conference on Machine Vision and Human-machine Interface. pp. 373- 376 ,(2010) , 10.1109/MVHI.2010.47