Security Professionals Must Reinforce Detect Attacks to Avoid Unauthorized Data Exposure

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Empirical Framework To Detect Security Attacks On the Cloud Data Storage System

Providing an adequate security level in Cloud Environments is currently a particularly active analysis space. a lot of specifically, malicious behaviors targeting massive scale Cloud knowledge repositories (e.g. Denial of Service attacks) could drastically degrade the general performance of such systems and can't be detected by typical authentication mechanisms. during this paper we have a tend...

متن کامل

Streamed analysis of network files to avoid false positives and to detect client-side attacks

Attacks exploiting client-side vulnerabilities are common nowadays. Those attacks are more difficult to be addressed due the complexity of protocols and file formats. Generic detection mechanisms, such as code disassembly, are often inefficient against client-side vulnerabilities due to size constraints in the gateway inspection and the embedded encoding specific to some file formats. This arti...

متن کامل

Preventing Unauthorized Data Flows

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

متن کامل

How to Avoid Spreading Error Scientists Must Search for Corrections

In 1954 Conway Zirkle reviewed the fascinating history of the patterns and context of citations to the falsified scientific experiments published by Viennese zoologist Paul Kammerer. Using two types of salamanders and the male of the midwife toad, Kammerer claimed in the 1920s to have shown that acquired characteristics were inherited. But, as Zirkle recounts, “the acquired characters ... turne...

متن کامل

Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks

The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: INFORMATION TECHNOLOGY IN INDUSTRY

سال: 2021

ISSN: 2203-1731

DOI: 10.17762/itii.v8i1.76