A Defense System on DDOS Attacks in Mobile Ad Hoc Networks Network security is a weak link in wired and wireless network systems. Malicious attacks have caused tremendous loss by impairing the functionalities of t... Yu,Xuan 被引量: 10发表: 2007年 Threats to VoIP Communications Systems This ...
4. THREATS IN CLOUD COMPUTING 4..1 What is a Threat? A threat is simply any event that, if realized, can cause damage to a system and create a loss of confidentiality, availability, or integrity. [4]. Threats can be malicious, such as the intentional modification of sensitive information...
Aspects of the present disclosure relate to systems and methods for detecting a threat of a computing system. In one aspect, a plurality of instances of input data may be received from at least one sensor. A feature vector based upon at least one instance of the plurality of instances of ...
It is important to identify and understand the threats to the system in order develop a secure system. The main objectives of this paper are to discuss the computer security threats towards the e-learning system assets and to study the six categories of computer security threats to the e-...
Vulnerability management is the process that identifies, prioritizes, and addresses flaws in computer systems and software. Hackers can easily abuse such weaknesses or bottlenecks in security to gain unauthorized access, steal personal and sensitive data, or disrupt application operations. Vulnerability man...
- 《Journal of Network & Computer Applications》 被引量: 421发表: 2014年 Security Challenges in Vehicular Cloud Computing In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dim... G Yan,W...
Computer virus: On a network system, a device functions as both a forwarding node and a manageable network element (NE). If computers on the same network segment are infected with viruses, a large amount of spam traffic is generated, exhausting network bandwidth. In this case, a device funct...
Rootkitswork deep down in the operating system to take over a computer or network. Attackers use this to give themself permissions that allow them to perform actions a normal user can’t do. Botnetsare created by malware that takes over a computer and uses that computer for some action. For...
摘要: We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: usi会议名称: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004...
File-based(Type III: executable, Flash, Java, documents): An initial file may exploit the operating system, the browser, the Java engine, the Flash engine, etc. to execute a shellcode and deliver a payload in memory. While the payload is fileless, the initial entry vector is a file. ...