Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 2 SI
Page No. 2992 - 3000

Design and Implementation of the Safety Application Execution Control System Using the White-Listing

Authors : Sang-Ann Nam, Jong-Chul Park, Jae-Pyo Park and Chang-Hong Kim

References

Castro, M., M. Costa and T. Harris, 2006. Securing software by enforcing data-flow integrity. Proceedings of the 7th Symposium on Operating Systems Design and Implementation, November 06-08, 2006, USENIX Association, Seattle, Washington, ISBN:1-931971-47-1, pp: 147-160.

Chen, P., L. Desmet and C. Huygens, 2014. A Study on Advanced Persistent Threats. In: Communications and Multimedia Security, Decker, D.B. and A. Zuquete (Eds.). Springer, Berlin, Germany, ISBN:978-3-662-44884-7, pp: 63-72.

FireEye, 2014. Fireeye advanced threat report 2013. FireEye, Milpitas, California, USA.

Jain, A.K. and B.B. Gupta, 2016. A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP. J. Inf. Secur., 2016: 1-11.
CrossRef  |  Direct Link  |  

Lee, J., Y. Lee and S.C. Kim, 2013. A White-List based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. In: Grid and Pervasive Computing, Park, J.J.H., H.R. Arabnia, C. Kim, W. Shi and J.M. Gil (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-38026-6, pp: 860-865.

Lee, K., R.S. Tolentino, G.C. Park and Y.T. Kim, 2010. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment. In: Communication and Networking, Kim, T., A.C.C. Chang, M. Li, C. Rong and C.Z. Patrikakis et al. (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-17586-2, pp: 155-163.

Liu, S.T., Y.M. Chen and S.J. Lin, 2013. A Novel Search Engine to Uncover Potential Victims for Apt Investigations. In: Network and Parallel Computing, Hsu, C., X. Li, X. Shi and R. Zheng (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-40819-9, pp: 405-416.

Prakash, P., M. Kumar, R.R. Kompella and M. Gupta, 2010. PhishNet: Predictive blacklisting to detect phishing attacks. Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, March 14-19, 2010, San Diego, CA., USA., pp: 1-5.

Ransbotham, S. and S. Mitra, 2013. The Impact of Immediate Disclosure on Attack Diffusion and Volume. In: Economics of Information Security and Privacy, Schneier, B. (Ed.). Springer, New York, USA., ISBN:978-1-4614-1980-8, pp: 1-12.

Reaves, B. and T. Morris, 2012. An open virtual testbed for industrial control system security research. Intl. J. Inf. Secur., 11: 215-229.
Direct Link  |  

Sheng, S., B. Wardman, G. Warner, L. Cranor, J. Hong and C. Zhang, 2009. An empirical analysis of phishing blacklists. Proceedings of the 6th Conference on Email and Anti-Spam, July 16-17, 2009, Mountain View, California, USA -.

Warren, M. and W. Hutchinson, 2000. Cyber attacks against supply chain management systems: A short note. Intl. J. Phys. Distribution Logistics Manage., 30: 710-716.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved