Vardi, 2017 - Google Patents
Cyber insecurity and cyber libertarianismVardi, 2017
- Document ID
- 7237630388468367681
- Author
- Vardi M
- Publication year
- Publication venue
- Communications of the ACM
External Links
Snippet
Cyber insecurity and cyber libertarianism | Communications of the ACM skip to main content
ACM Digital Library home ACM Association for Computing Machinery corporate logo Google,
Inc. (search) Advanced Search Browse About Sign in Register Advanced Search Journals …
- 238000005516 engineering process 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Luttgens et al. | Incident response & computer forensics | |
| Vermaat et al. | Enhanced Discovering Computers 2017, Essentials | |
| Vardi | Cyber insecurity and cyber libertarianism | |
| Guitton | Facing cyberthreats:: Answering the new security challenges of the digital age | |
| Hansche | Official (ISC) 2 Guide to the ISSEP CBK | |
| Reiter | Side channels in multi-tenant environments | |
| Bauer et al. | What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? | |
| Jaeger | Configuring software and systems for defense-in-depth | |
| and Communication Networks | Retracted:: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior | |
| Nikolich | Sdn research challenges and opportunities | |
| Preneel | Post-snowden threat models | |
| Rieck | Off the beaten path: Machine learning for offensive security | |
| Mobile Computing | Retracted:: The Combination of Internet of Things Technology Based on Probability Model Network and Mass Education | |
| Mobile Computing | Retracted:: Application Research of Data Encryption Algorithm in Computer Security Management | |
| Setola | Interdependencies and third parties | |
| Mobile Computing | Retracted:: Application of Information Encryption Technology in Computer Network Communication Security | |
| Freeman et al. | 9th International Workshop on Artificial Intelligence and Security: AISec 2016 | |
| Balson | Far cry 5: Pastor Jerome | |
| Abazi | Introduction to Information Security and Crypotography: Learn how information technology professionals use the cryptosystems to maintain the privacy and protect the data | |
| Sitarz et al. | Cyber 9/12 student challenge: team Purdue cyber forensics | |
| Vitanov | Rising hope | |
| Ahn et al. | WPES 2014: 13th Workshop on Privacy in the Electronic Society | |
| Olzak | Incident Management and Response Guide: Tools, Techniques, Planning, and Templates | |
| Hernacki | Emerging threats | |
| Thuraisingham | Multimedia systems security |