Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
2 SI
Page No.
2992 - 3000
References
Castro, M., M. Costa and T. Harris, 2006. Securing software by enforcing data-flow integrity. Proceedings of the 7th Symposium on Operating Systems Design and Implementation, November 06-08, 2006, USENIX Association, Seattle, Washington, ISBN:1-931971-47-1, pp: 147-160.
Chen, P., L. Desmet and C. Huygens, 2014. A Study on Advanced Persistent Threats. In: Communications and Multimedia Security, Decker, D.B. and A. Zuquete (Eds.). Springer, Berlin, Germany, ISBN:978-3-662-44884-7, pp: 63-72.
FireEye, 2014. Fireeye advanced threat report 2013. FireEye, Milpitas, California, USA.
Jain, A.K. and B.B. Gupta, 2016. A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP. J. Inf. Secur., 2016: 1-11.
CrossRef | Direct Link | Lee, J., Y. Lee and S.C. Kim, 2013. A White-List based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. In: Grid and Pervasive Computing, Park, J.J.H., H.R. Arabnia, C. Kim, W. Shi and J.M. Gil (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-38026-6, pp: 860-865.
Lee, K., R.S. Tolentino, G.C. Park and Y.T. Kim, 2010. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment. In: Communication and Networking, Kim, T., A.C.C. Chang, M. Li, C. Rong and C.Z. Patrikakis
et al. (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-17586-2, pp: 155-163.
Liu, S.T., Y.M. Chen and S.J. Lin, 2013. A Novel Search Engine to Uncover Potential Victims for Apt Investigations. In: Network and Parallel Computing, Hsu, C., X. Li, X. Shi and R. Zheng (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-40819-9, pp: 405-416.
Prakash, P., M. Kumar, R.R. Kompella and M. Gupta, 2010. PhishNet: Predictive blacklisting to detect phishing attacks. Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, March 14-19, 2010, San Diego, CA., USA., pp: 1-5.
Ransbotham, S. and S. Mitra, 2013. The Impact of Immediate Disclosure on Attack Diffusion and Volume. In: Economics of Information Security and Privacy, Schneier, B. (Ed.). Springer, New York, USA., ISBN:978-1-4614-1980-8, pp: 1-12.
Reaves, B. and T. Morris, 2012. An open virtual testbed for industrial control system security research. Intl. J. Inf. Secur., 11: 215-229.
Direct Link | Sheng, S., B. Wardman, G. Warner, L. Cranor, J. Hong and C. Zhang, 2009. An empirical analysis of phishing blacklists. Proceedings of the 6th Conference on Email and Anti-Spam, July 16-17, 2009, Mountain View, California, USA -.
Warren, M. and W. Hutchinson, 2000. Cyber attacks against supply chain management systems: A short note. Intl. J. Phys. Distribution Logistics Manage., 30: 710-716.
Direct Link |