A survey of emerging threats in cybersecurity

作者: Julian Jang-Jaccard , Surya Nepal , None

DOI: 10.1016/J.JCSS.2014.02.005

关键词:

摘要: … an urgent requirement in the cybersecurity community. To … cybersecurity experts believe that malware is the key choice of weapon to carry out malicious intends to breach cybersecurity …

参考文章(108)
John Viega, David LeBlanc, Michael Howard, 19 Deadly Sins of Software Security McGraw-Hill, Inc.. ,(2005)
Wenke Lee, Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Impeding Malware Analysis Using Conditional Code Obfuscation network and distributed system security symposium. pp. 1- 13 ,(2008)
Graham Cluley, Sizing up the malware threat – key malware trends for 2010 Network Security. ,vol. 2010, pp. 8- 10 ,(2010) , 10.1016/S1353-4858(10)70045-3
David W. Chadwick, Mark Hibbert, Towards Automated Trust Establishment in Federated Identity Management international conference on trust management. pp. 33- 48 ,(2013) , 10.1007/978-3-642-38323-6_3
Dongwan Shin, Gail Joon Ahn, Role-based privilege and trust management Computer Systems: Science & Engineering. ,vol. 20, pp. 401- 410 ,(2005)
Alan Soper, Richard J. Anthony, Christopher Walshaw, Thaddeus O. Eze, A New Architecture for Trustworthy Autonomic Systems EMERGING 2012, The Fourth International Conference on Emerging Network Intelligence. pp. 62- 68 ,(2012)
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu Upadhyaya, A data-centric approach to insider attack detection in database systems recent advances in intrusion detection. pp. 382- 401 ,(2010) , 10.1007/978-3-642-15512-3_20
Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel, Large-Scale Network Monitoring for Visual Analysis of Attacks visualization for computer security. pp. 111- 118 ,(2008) , 10.1007/978-3-540-85933-8_11
Lorrie Faith Cranor, Simson Garfinkel, None, Security and Usability: Designing Secure Systems that People Can Use ,(2005)