Glentis et al., 2009 - Google Patents
Managing Security IssuesGlentis et al., 2009
View PDF- Document ID
- 3489097980431237269
- Author
- Glentis A
- Panopoulos A
- Kapareliotis I
- et al.
- Publication year
- Publication venue
- Review of Business Information Systems (RBIS)
External Links
Snippet
Security is coming more and more in the spotlight of today's news. Several reasons have lead to this, like the maturity of computer technology, which gave access to more people to computer systems, and the evolution of the internet and computer networking in general …
- 238000005516 engineering process 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hussain et al. | Multilevel classification of security concerns in cloud computing | |
| Singh et al. | A survey on cloud computing security: Issues, threats, and solutions | |
| Sood et al. | Dissecting SpyEye–Understanding the design of third generation botnets | |
| US20090204964A1 (en) | Distributed trusted virtualization platform | |
| US20140059688A1 (en) | Detection and mitigation of side-channel attacks | |
| US10771477B2 (en) | Mitigating communications and control attempts | |
| Ahmed et al. | A review of challenges and security risks of cloud computing | |
| Wong et al. | Threat modeling and security analysis of containers: A survey | |
| US11706251B2 (en) | Simulating user interactions for malware analysis | |
| US20240163261A1 (en) | Dynamic authentication attack detection and enforcement at network, application, and host level | |
| US12197577B2 (en) | Malicious JS detection based on automated user interaction emulation | |
| WO2024263817A1 (en) | Dynamic authentication attack detection and enforcement at network, application, and host level | |
| US8925091B2 (en) | System and method for evaluation in a collaborative security assurance system | |
| WO2025029704A1 (en) | System and method for attacker interdiction using track and trace user and entity behavior analysis | |
| Riccardi et al. | A framework for financial botnet analysis | |
| Shah et al. | Implementation of user authentication as a service for cloud network | |
| Deshpande et al. | Major web application threats for data privacy & security–detection, analysis and mitigation strategies | |
| O’Sullivan et al. | Defending IoT devices from malware | |
| Nazir et al. | Security threats with associated mitigation techniques in cloud computing | |
| Feng et al. | The theory and practice in the evolution of trusted computing | |
| JP2025505412A (en) | System and method for detecting exploits involving shellcode - Patents.com | |
| Glentis et al. | Managing Security Issues | |
| Leijonberg | The Viability of Using Trusted Execution Environments to Protect Data in Node-RED: A study on using AMD-SEV and Intel SGX to protect sensitive data when Node-RED is deployed on the cloud. | |
| Yasui et al. | SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices | |
| Ko | Creating Trusted Systems in Untrusted Environments |