Security threats to critical infrastructure: the human factor
暂无分享,去创建一个
Thar Baker | Mohammad Hammoudeh | Sohail Jabbar | Ibrahim Ghafir | Vaclav Prenosil | Sardar F. Jaf | Jibran Saleem | Hanan Faour | T. Baker | Sohail Jabbar | Mohammad Hammoudeh | Václav Přenosil | Ibrahim Ghafir | Jibran Saleem | Hanan Faour | Sohail Jabbar | Sohail Jabbar
[1] T. Truta,et al. Impact of security awareness training on phishing click-through rates , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[2] Radha Gulati. The Threat of Social Engineering and Your Defense Against It , 2003 .
[3] Mohammad Hammoudeh,et al. Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[4] IBRAHIM GHAFIR,et al. Botnet Command and Control Traffic Detection Challenges A Correlation based Solution , 2016 .
[5] Ibrahim Ghafir,et al. DNS traffic analysis for malicious domains detection , 2015, 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN).
[6] Bamidele Adebisi,et al. A state of the art survey - Impact of cyber attacks on SME's , 2017, International Conference on Future Networks and Distributed Systems.
[7] Mohammad Hammoudeh,et al. A Survey on Network Security Monitoring Systems , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[8] Mohammad Hammoudeh,et al. Defense Methods Against Social Engineering Attacks , 2018, Computer and Network Security Essentials.
[9] Mohammad Hammoudeh,et al. Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence , 2017, ICFNDS.
[10] Niloy Ganguly,et al. Stop Clickbait: Detecting and preventing clickbaits in online news media , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[11] Taimur Bakhshi,et al. Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors , 2017, 2017 13th International Conference on Emerging Technologies (ICET).
[12] Michael J. Donahoo,et al. TCP / IP sockets in Java - practical guide for programmers , 2002, The Morgan Kaufmann practical guides series.
[13] Ibrahim Ghafir,et al. Blacklist-based malicious IP traffic detection , 2015, 2015 Global Conference on Communication Technologies (GCCT).
[14] Michael J. Donahoo,et al. TCP / IP sockets in C# - practical guide for programmers , 2004, The Morgan Kaufmann practical guides series.
[15] Václav Přenosil,et al. Network Monitoring Approaches: An Overview , 2015 .
[16] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[17] Václav Přenosil,et al. A Survey on Botnet Command and Control Traffic Detection , 2015 .
[18] Václav Přenosil,et al. Advanced Persistent Threat Attack Detection: An Overview , 2014 .
[19] Václav Přenosil,et al. A Survey on Intrusion Detection and Prevention Systems , 2014 .
[20] Shirley Payne. Developing Security Education and Awareness Programs , 2003 .
[21] A. Govardhan,et al. A Comparison Between Five Models Of Software Engineering , 2010 .
[22] Ibrahim Ghafir,et al. Proposed Approach for Targeted Attacks Detection , 2016 .