Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Youngsang Shin"'
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 25:1525-1540
Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a pur
Publikováno v:
Security and Communication Networks. 8:176-188
Web spammers have taken note of the popularity of public forums such as blogs, wikis, webboards, and guestbooks. They are now exploiting them with the purpose of driving traffic to their malicious or fraudulent websites, such as those used for phishi
Publikováno v:
ICOIN
With the spread of smartphones, our daily lives become more convenient. However, using smartphone has also made us to be exposed to various security threats. Especially, the number of mobile malware has been increasing with years and mobile malwares
Publikováno v:
2015 2nd International Conference on Information Science and Security (ICISS).
Currently, we are faced with a major problem concerning the use of malicious codes in hacking attacks, which is becoming increasingly intelligent. We became curious about the major factors behind the cyber incident, which prompted us to conduct resea
Publikováno v:
ICTC
Due to the rapid development of the IT industry, the threat of cyber-attacks has been increasing gradually and more intelligent. These days, the same attack groups carry out cyber-attack continuously by using their resources that are necessary to the
Publikováno v:
Advances in Intelligent Systems Research.
Cloud computing is becoming increasingly popular. Many companies utilize cloud computing services to minimize IT infrastructure costs. The popularity of cloud computing has attracted the interest of cyber criminals. As the result, virtualized environ
Publikováno v:
INFOCOM
Forums on the Web are increasingly spammed by miscreants in order to attract visitors to their (often malicious) websites. In this paper, we study the prevalence of forum spamming and find that Internet users are at a high risk of encountering forums
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642161605
SecureComm
SecureComm
The move to a pervasive computing environment, with the increasing use of laptops, netbooks, smartphones and tablets, means that we are more reliant on wireless networking and batteries for our daily computational needs. Specifically, this includes a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::005d844ededa71bba6b017af6674f67e
https://doi.org/10.1007/978-3-642-16161-2_9
https://doi.org/10.1007/978-3-642-16161-2_9
Publikováno v:
IEEE INFOCOM Workshops 2009.
PDAs and smartphones are increasingly being used as handheld computers. Today, their network connectivity and their usages for various tasks over the Internet require privacy and authenticity. In this paper, we conduct a comprehensive and comparative
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783642029172
DIMVA
DIMVA
The Asprox infection weaves a complex chain of dependencies involving bots that perform SQL injections on vulnerable web servers, and visitors whose machines get compromised simply by visiting infected websites. Using real-world data sets, we study A
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56763831a4850f5619e42bc239adeb11
https://doi.org/10.1007/978-3-642-02918-9_1
https://doi.org/10.1007/978-3-642-02918-9_1