Jump to content

Talk:Man-on-the-side attack

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by Sohom Datta (talk | contribs) at 19:09, 28 April 2024 (Assessment (Low): banner shell, Computer Security (Rater)). The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Untitled

[edit]

Hi I'm Quackdon, I plan to expand the page using the following resources:

Lévesque, F., Chiasson, S., Somayaji, A. and Fernandez, J., 2018. Technological and Human Factors of Malware Attacks. ACM Transactions on Privacy and Security, 21(4), pp.1-30. [PDF] Kjaerland, Maria. 2005. "A Classification Of Computer Security Incidents Based On Reported Attack Data." Journal of Investigative Psychology and Offender Profiling 2(2):105-120. [PDF]

Salva, Sébastien, and Loukmen Regainia. 2019. "A Catalogue Associating Security Patterns And Attack Steps To Design Secure Applications." Journal of Computer Security 27(1):49-74.

[PDF]

Valente, Junia, Matthew A. Wynn, and Alvaro A. Cardenas. 2019. "Stealing, Spying, And Abusing: Consequences Of Attacks On Internet Of Things Devices." IEEE Security & Privacy 17(5):9-26.

[PDF]

Varadharajan, Vijay, and Uday Tupakula. 2020. "Counteracting Attacks From Malicious End Hosts In Software Defined Networks." IEEE Transactions on Network and Service Management 17(1):160-176.

[PDF]

Dey, Debabrata, Atanu Lahiri, and Guoying Zhang. 2011. "Hacker Behavior, Network Effects, And The Security Software Market." SSRN Electronic Journal. 29(2): 77-108

[PDF]

Stergiopoulos, George, Dimitris A. Gritzalis, and Evangelos Limnaios. 2020. "Cyber-Attacks On The Oil & Gas Sector: A Survey On Incident Assessment And Attack Patterns." IEEE Access 8:128440-128475.

[PDF]

Redondo, Alberto, and David Ríos Insua. 2020. "Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis." Risk Analysis 18(4):178-197.

[PDF]

Mushtaq, Maria et al. 2020. "WHISPER: A Tool For Run-Time Detection Of Side-Channel Attacks." IEEE Access 8:83871-83900.

[PDF]

Molotkov, S. N. 2020. "Trojan Horse Attacks, Decoy State Method, And Side Channels Of Information Leakage In Quantum Cryptography." Journal of Experimental and Theoretical Physics 130(6):809-832.

{PDF]

Albahar, Marwan. 2017. "Cyber Attacks And Terrorism: A Twenty-First Century Conundrum." Science and Engineering Ethics 25(4):993-1008.

[PDF]

de Arimatéia da Cruz, José. 2020. "Cyber Mercenaries: A New Threat to National Security". International Social Science Review. 2020, 96(2): 1-33.

[PDF]

Monarch, Benjamin. 2020. "Black Start: The Risk Of Grid Failure From A Cyber Attack And The Policies Needed To Prepare For It." Journal of Energy & Natural Resources Law 38(2):131-160.

[PDF]

Vasilescu, Cezar. 2012. "Cyber Attacks:Emerging Threats To The 21St Century Critical Information Infrastructures." Obrana a strategie (Defence & Strategy) 12(1):053-072.

[PDF]

Douzet, Frederick. 2014. "Understanding Cyberspace with Geopolitics". In Hérodote 152(1): 3-21

[PDF]

Ruhl, Christian, Duncan Hollis, Wyatt Hoffman, and Tim Maurer. 2020. "Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Pro cesses at a Crossroads"Carnegie Endowment for International Peace. 14(1): 7-32

[PDF]

Haddad, Christian, and Clemens Binder. 2019. "Governing Through Cybersecurity: National Policy Strategies, Globalized (In‑)Security And Sociotechnical Visions Of The Digital Society." Österreichische Zeitschrift für Soziologie 44(S1):115-134.

[PDF]

McConnell, Mike. 2017 "10th Annual Law & Society Symposium: Cybersecurity: Keeping Us Safe or Making Us Vulnerable". 12 Charleston L. Rev. 323 (Summer 2018) / Charleston Law Review. 12(3): 323-341

{pdf]

de Oliveira Albuquerque, Robson, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Rafael Timóteo de Sousa Júnior, and Tai-Hoon Kim. 2015. "Leveraging Information Security And Computational Trust For Cybersecurity." The Journal of Supercomputing 72(10):3729-3763.

[PDF] Stevens, Clare. 2019. "Assembling Cybersecurity: The Politics And Materiality Of Technical Malware Reports And The Case Of Stuxnet." Contemporary Security Policy 41(1):129-152. [PDF] — Preceding unsigned comment added by Quackdon (talkcontribs) 05:41, 18 October 2020 (UTC)[reply]

Wiki Education Foundation-supported course assignment

[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Quackdon. Peer reviewers: IntheHeartofTexas, Niangao, BunnyShampoo, Imakespaghetti29, Moonstar0619, Sfwarriors99.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 14:36, 18 January 2022 (UTC)[reply]