[go: up one dir, main page]

Vardi, 2017 - Google Patents

Cyber insecurity and cyber libertarianism

Vardi, 2017

Document ID
7237630388468367681
Author
Vardi M
Publication year
Publication venue
Communications of the ACM

External Links

Snippet

Cyber insecurity and cyber libertarianism | Communications of the ACM skip to main content ACM Digital Library home ACM Association for Computing Machinery corporate logo Google, Inc. (search) Advanced Search Browse About Sign in Register Advanced Search Journals …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Luttgens et al. Incident response & computer forensics
Vermaat et al. Enhanced Discovering Computers 2017, Essentials
Vardi Cyber insecurity and cyber libertarianism
Guitton Facing cyberthreats:: Answering the new security challenges of the digital age
Hansche Official (ISC) 2 Guide to the ISSEP CBK
Reiter Side channels in multi-tenant environments
Bauer et al. What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Jaeger Configuring software and systems for defense-in-depth
and Communication Networks Retracted:: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior
Nikolich Sdn research challenges and opportunities
Preneel Post-snowden threat models
Rieck Off the beaten path: Machine learning for offensive security
Mobile Computing Retracted:: The Combination of Internet of Things Technology Based on Probability Model Network and Mass Education
Mobile Computing Retracted:: Application Research of Data Encryption Algorithm in Computer Security Management
Setola Interdependencies and third parties
Mobile Computing Retracted:: Application of Information Encryption Technology in Computer Network Communication Security
Freeman et al. 9th International Workshop on Artificial Intelligence and Security: AISec 2016
Balson Far cry 5: Pastor Jerome
Abazi Introduction to Information Security and Crypotography: Learn how information technology professionals use the cryptosystems to maintain the privacy and protect the data
Sitarz et al. Cyber 9/12 student challenge: team Purdue cyber forensics
Vitanov Rising hope
Ahn et al. WPES 2014: 13th Workshop on Privacy in the Electronic Society
Olzak Incident Management and Response Guide: Tools, Techniques, Planning, and Templates
Hernacki Emerging threats
Thuraisingham Multimedia systems security