CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Willingness of end users to pay for e-waste recycling

BACKGROUND AND OBJECTIVES: The sheer volume of electrical and electronic waste (e-waste) has presently been generated in Vietnam, posing a growing concern regarding its impact can have on the environment and human health. Therefore, the need for developing policies and regulations towards the environmentally sound management of e-waste is becoming crucial. Although the municipa...

متن کامل

the differential effects of debate and media analysis as relate to enhancing efl learners critical thinking ability and writing performances

critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...

15 صفحه اول

Detecting Web Attacks with End-to-End Deep Learning

Web applications are popular targets for cyber-attacks because they are network accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually select...

متن کامل

Bringing Deployable Key Transparency to End Users

We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on related designs for transparency of web server certificates but solves several new challenges specific to key verification for end users. In comparison to prior designs, CONIKS enables more efficient monitoring and auditing of keys, allowing small organi...

متن کامل

CONIKS: Bringing Key Transparency to End Users

We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key verification for end users. CONIKS obviates the need for global third-party monitors and enables users to efficiently monitor their own key bindings ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016912556