Educational modules and research surveys on critical cybersecurity topics
暂无分享,去创建一个
[1] Naren Ramakrishnan,et al. Causality-based Sensemaking of Network Traffic for Android Application Security , 2016, AISec@CCS.
[2] Erkang Zheng,et al. Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery , 2018, HoTSoS '18.
[3] Avishai Wool,et al. Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese , 2010, IEEE Internet Computing.
[4] Michael Backes,et al. Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Shiuh-Pyng Shieh,et al. Web Application Security: Threats, Countermeasures, and Pitfalls , 2017, Computer.
[6] Patricia Y. Logan,et al. Teaching students to hack: curriculum issues in information security , 2005 .
[7] Steve R. White,et al. An Undetectable Computer Virus , 2000 .
[8] Qingqing Wu,et al. Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.
[9] Xiuzhen Cheng,et al. Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming , 2019, IEEE Transactions on Wireless Communications.
[10] Andrei Gurtov,et al. Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.
[11] Hiroshi Esaki,et al. Probing Firewalls of Malware-Infected Networks with Honeypot , 2019, CFI.
[12] Md. Saeed Siddik,et al. Analyzing Web Application Vulnerabilities: An Empirical Study on E-Commerce Sector in Bangladesh , 2020, ICCA.
[13] Charles P. Pfleeger,et al. Security in computing , 1988 .
[14] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[15] Zarul Fitri Zaaba,et al. Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm , 2017 .
[16] Luying Zhou,et al. SCADAWall: A CPI-enabled firewall model for SCADA security , 2019, Comput. Secur..