Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Gary C. Kessler"'
Autor:
Gary C. Kessler
Publikováno v:
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, Vol 14, Iss 2, Pp 279-286 (2020)
The Automatic Identification System (AIS) provides situational awareness for vessels at sea. AIS has a number of known security vulnerabilities that can lead to a several types of attacks on AIS, including the ability to create ghost vessels, false w
Externí odkaz:
https://doaj.org/article/e7d148c3300f413cb63d48b5cd80a476
Publikováno v:
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, Vol 12, Iss 3, Pp 429-437 (2018)
The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the
Externí odkaz:
https://doaj.org/article/462ff1190a0947a79c3ffe6237ef47e8
Autor:
Dennis Browning, Gary C. Kessler
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 4, Iss 2, Pp 57-72 (2009)
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth com
Externí odkaz:
https://doaj.org/article/7482a6949cfe4f97970f4a88cdd5ce73
Autor:
Gary C. Kessler
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 2, Iss 2, Pp 67-70 (2007)
Libicki, M.C. (2007). Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper), US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.edu)Many books -- and
Externí odkaz:
https://doaj.org/article/82498e8f3dad460c82fad14b8e4554b4
Autor:
Gary C. Kessler
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 1, Iss 4, Pp 67-70 (2006)
Kanellis, P., Kiountouzis, E., Kolokotronis, N., & Martakos, D. (2006). Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 357 pages, ISBN: 1-59140-873-3 (paper), US$79.95.Reviewed by Gary C. KesslerThis book, accor
Externí odkaz:
https://doaj.org/article/0a06f29ad0be49bea7c272b41576797a
Autor:
Gary C. Kessler, Michael E. Schirling
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 1, Iss 3, Pp 37-50 (2006)
Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital inv
Externí odkaz:
https://doaj.org/article/40eecc6617194b3e8dbc2230700d75d7
Autor:
Gary C. Kessler
Publikováno v:
TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation. 15:531-540
Publikováno v:
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, Vol 12, Iss 3, Pp 429-437 (2018)
The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the
Autor:
Gregory H. Carlton, Gary C. Kessler
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 10:62-65
The study and practice of forensic science comprises many distinct areas that range from behavioral to biological to physical and to digital matters, and in each area forensic science is utilized to obtain evidence that will be admissible within the
Autor:
Gary C. Kessler, Gregory H. Carlton
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 10:55-61
Best practices in digital forensics include a procedure to sanitize media on which forensic images will be stored, thus eliminating potential challenges that contamination of the evidence may occur due to data that exist on the media prior to storing