[go: up one dir, main page]

Glentis et al., 2009 - Google Patents

Managing Security Issues

Glentis et al., 2009

View PDF
Document ID
3489097980431237269
Author
Glentis A
Panopoulos A
Kapareliotis I
et al.
Publication year
Publication venue
Review of Business Information Systems (RBIS)

External Links

Snippet

Security is coming more and more in the spotlight of today's news. Several reasons have lead to this, like the maturity of computer technology, which gave access to more people to computer systems, and the evolution of the internet and computer networking in general …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
Hussain et al. Multilevel classification of security concerns in cloud computing
Singh et al. A survey on cloud computing security: Issues, threats, and solutions
Sood et al. Dissecting SpyEye–Understanding the design of third generation botnets
US20090204964A1 (en) Distributed trusted virtualization platform
US20140059688A1 (en) Detection and mitigation of side-channel attacks
US10771477B2 (en) Mitigating communications and control attempts
Ahmed et al. A review of challenges and security risks of cloud computing
Wong et al. Threat modeling and security analysis of containers: A survey
US11706251B2 (en) Simulating user interactions for malware analysis
US20240163261A1 (en) Dynamic authentication attack detection and enforcement at network, application, and host level
US12197577B2 (en) Malicious JS detection based on automated user interaction emulation
WO2024263817A1 (en) Dynamic authentication attack detection and enforcement at network, application, and host level
US8925091B2 (en) System and method for evaluation in a collaborative security assurance system
WO2025029704A1 (en) System and method for attacker interdiction using track and trace user and entity behavior analysis
Riccardi et al. A framework for financial botnet analysis
Shah et al. Implementation of user authentication as a service for cloud network
Deshpande et al. Major web application threats for data privacy & security–detection, analysis and mitigation strategies
O’Sullivan et al. Defending IoT devices from malware
Nazir et al. Security threats with associated mitigation techniques in cloud computing
Feng et al. The theory and practice in the evolution of trusted computing
JP2025505412A (en) System and method for detecting exploits involving shellcode - Patents.com
Glentis et al. Managing Security Issues
Leijonberg The Viability of Using Trusted Execution Environments to Protect Data in Node-RED: A study on using AMD-SEV and Intel SGX to protect sensitive data when Node-RED is deployed on the cloud.
Yasui et al. SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices
Ko Creating Trusted Systems in Untrusted Environments