Academic literature on the topic 'Browser Hijacking Software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Browser Hijacking Software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Browser Hijacking Software"

1

Pan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.

Full text
Abstract:
Many famous attacks take web browsers as transmission channels to make the target computer infected by malwares, such as watering hole and domain name hijacking. In order to protect the data transmission, the SSL/TLS protocol has been widely used to defeat various hijacking attacks. However, the existence of such encryption protection makes the security software and devices confront with the difficulty of analyzing the encrypted malicious traffic at endpoints. In order to better solve this kind of situation, this paper proposes a new efficient and transparent method for large-scale automated T
APA, Harvard, Vancouver, ISO, and other styles
2

Oseni, Rayhanat Olatundun, and Abdul-Quadri Olayinka Oseni. "Data Security: Data Breach by Free Websites and Applications." Recent Trends in Information Technology and its Application 2, no. 3 (2019): 1–9. https://doi.org/10.5281/zenodo.3529369.

Full text
Abstract:
<em>This paper talks about data security which is the protection of data from unauthorized access. It defines data insecurity as unauthorized access and collection of data with or without the users&rsquo; knowledge. It explains how data are collected from the internet and through applications some of which are; Adware, Spyware, Browser Hijacking Software, Browsing History, In-Website Browsing History. It goes further to list what data can be collected by a website or an application with pictorial examples. This paper identifies the methods of preventing data breach, for example; Using internet
APA, Harvard, Vancouver, ISO, and other styles
3

LYSENKO, S., V. OMELIANENKO, and R. SHCHUKA. "METHOD FOR THE SPYWARE IDENTIFICATION IN THE COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 285, no. 3 (2020): 43–49. https://doi.org/10.31891/2307-5732-2020-285-3-7.

Full text
Abstract:
The paper presents a method of identification of spyware identification software in computer systems, which allows detection of all types, and differs from the known ones, which provides the principle of proactivity and is based on mechanisms of machine learning. For the proposed method of identifying spyware, it uses an analysis of the behaviour of the software on computer systems. The method is also based on a downstream analysis of the involvement of machine learning apparatus, in particular reinforcement learning, which operates with concepts of stability values for the malware detection.
APA, Harvard, Vancouver, ISO, and other styles
4

"Assessment of Security Issues in Cloud Computing." International Journal of Recent Technology and Engineering 8, no. 2S8 (2019): 991–93. http://dx.doi.org/10.35940/ijrte.b1189.0882s819.

Full text
Abstract:
A computing model in which the computing resources such as hardware, software and data are provided as a service via web browser or light-weight desktop machine on the internet is termed as Cloud computing. This computing model demolishes the requirement of keeping the resources of computer locally hence reducing the cost of worthy resources (Llorente, Montero &amp; Moreno, 2012). A typical cloud is affected by various security concerns such as Temporary Denial of Service (TDOS) attacks, hijacking session issues, flashing attacks and theft of user identity. The motto of this study is to overco
APA, Harvard, Vancouver, ISO, and other styles
5

"Assessment of Security Issues in Cloud Computing." International Journal of Engineering and Advanced Technology 8, no. 6S (2019): 437–39. http://dx.doi.org/10.35940/ijeat.f1093.0886s19.

Full text
Abstract:
A computing model in which the computing resources such as hardware, software and data are provided as a service via web browser or light-weight desktop machine on the internet is termed as Cloud computing. This computing model demolishes the requirement of keeping the resources of computer locally hence reducing the cost of worthy resources (Llorente, Montero &amp; Moreno, 2012). A typical cloud is affected by various security concerns such as Temporary Denial of Service (TDOS) attacks, hijacking session issues, flashing attacks and theft of user identity. The motto of this study is to overco
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Browser Hijacking Software"

1

Alexander, Paulette S. "Unsolicited Web Intrusions." In Personal Web Usage in the Workplace. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-148-3.ch007.

Full text
Abstract:
Many employees have job responsibilities which require Web and other Internet applications. Because of the availability of intrusive software and the existence of various motivations, employees are subjected to unsolicited pop-up windows, browser hijacking, unintended release of confidential information, and unwanted e-mail. These intrusions are a significant problem for employees and employers because they waste resources and create liability situations. Solutions examined include education of employees, standards of practice in the conduct of job-related Internet use, policies regarding Inte
APA, Harvard, Vancouver, ISO, and other styles
2

"Web Server Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch008.

Full text
Abstract:
Organizational web servers reflect the public image of an organization and serve web pages/information to organizational clients via web browsers using HTTP protocol. Some of the web server software may contain web applications that enable users to perform high-level tasks, such as querying a database and delivering the output through the web server to the client browser as an HTML file. Hackers always try to exploit the different vulnerabilities or flaws existing in web servers and web applications, which can pose a big threat for an organization. This chapter provides the importance of prote
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!