Mannan et al., 2004 - Google Patents
Secure public instant messaging: A surveyMannan et al., 2004
View PDF- Document ID
- 7047374600344563028
- Author
- Mannan M
- van Oorschot P
- Publication year
- Publication venue
- Proceedings of Privacy, Security and Trust
External Links
Snippet
We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in light of existing threats. Our discussion and analysis provide a starting point from which to …
- 238000004458 analytical method 0 abstract description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Barrett et al. | SSH, the secure shell: the definitive guide | |
| Huang et al. | Using one-time passwords to prevent password phishing attacks | |
| Adeyinka | Internet attack methods and internet security technology | |
| US8631227B2 (en) | Processing encrypted electronic documents | |
| Mell et al. | Guide to malware incident prevention and handling | |
| Mannan et al. | On instant messaging worms, analysis and countermeasures | |
| Chakravarty et al. | Detecting traffic snooping in tor using decoys | |
| Mannan et al. | Secure public instant messaging: A survey | |
| Hindocha et al. | Malicious threats and vulnerabilities in instant messaging | |
| Emigh | The crimeware landscape: Malware, phishing, identity theft and beyond | |
| Mannan | Secure public instant messaging | |
| Moya | Analysis and evaluation of the snort and bro network intrusion detection systems | |
| Lee et al. | Threats hidden in office network: Mechanism of credential harvesting for lateral movement | |
| Bu et al. | The new era of botnets | |
| Musambo et al. | Identifying Botnets Intrusion & Prevention –A Review | |
| Sachs et al. | Securing IM and P2P Applications for the Enterprise | |
| Ciesla | Common Attacks Against Cryptographic Systems | |
| Xie et al. | Secure instant messaging in enterprise-like networks | |
| Ali | Social Engineering: Phishing latest and future techniques | |
| Alassouli | Hacking of Computer Networks | |
| Zeltser | The evolution of malicious agents | |
| Liakopoulos | Malware analysis & C2 covert channels | |
| Rao | Threats and security of Web services-a theoretical short study | |
| Sasko et al. | Security of Instant Messengers | |
| Sarvepalli | Designing Network Security Labs |