A survey of insider attack detection research
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …
in the computer security research literature. We distinguish between masqueraders and …
On security research towards future mobile network generations
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …
network generations have been revealed that threaten users as well as network providers. In …
[KİTAP][B] The cybersecurity dilemma: Hacking, trust, and fear between nations
B Buchanan - 2016 - books.google.com
Why do nations break into one another's most important computer networks? There is an
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …
Identity and content authentication for phone calls
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
Methods, systems, and media for detecting covert malware
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …
Methods, systems, and media for baiting inside attackers
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …
behavior are provided. In accordance with some embodiments, a method for detecting …
SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)
Abstract SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing
and other attacks against Internet services such as online banking. Today, SMS OTPs are …
and other attacks against Internet services such as online banking. Today, SMS OTPs are …
[PDF][PDF] Bugs in our pockets: The risks of client-side scanning
Our increasing reliance on digital technology for personal, economic, and government
affairs has made it essential to secure the communications and devices of private citizens …
affairs has made it essential to secure the communications and devices of private citizens …
Systems, methods, and media for generating bait information for trap-based defenses
Systems, methods, and media for generating bait information for trap-based defenses are
provided. In some embodiments, methods for generating bait information for trap-based …
provided. In some embodiments, methods for generating bait information for trap-based …