Academic literature on the topic 'Computer networks – security measures. Computer hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – security measures. Computer hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks – security measures. Computer hackers"

1

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or th
APA, Harvard, Vancouver, ISO, and other styles
2

Rai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.

Full text
Abstract:
Network and system security of cyber physical system is of vital significance in the present information correspondence environment. Hackers and network intruders can make numerous fruitful endeavors to bring crashing of the networks and web services by unapproved interruption. Computing systems connected to the Internet are stood up to with a plenty of security threats, running from exemplary computer worms to impart drive by downloads and bot networks. In the most recent years these threats have achieved another nature of automation and sophistication, rendering most defenses inadequate. Ord
APA, Harvard, Vancouver, ISO, and other styles
3

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also co
APA, Harvard, Vancouver, ISO, and other styles
4

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Banghua, Shah Nazir, and Neelam Mukhtar. "Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication." Complexity 2020 (November 12, 2020): 1–12. http://dx.doi.org/10.1155/2020/6690569.

Full text
Abstract:
Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion or eavesdropping occurs, it will lead to a severe disfigurement of
APA, Harvard, Vancouver, ISO, and other styles
6

Vasilenko, M., O. Kozin, M. Kozina, and V. Rachuk. "CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY." Municipal economy of cities 3, no. 156 (2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.

Full text
Abstract:
As a result of remote control and automation, the urban infrastructure becomes extremely vulnerable to intrusions, attacks, human errors, accidents that are growing. Due to the concentration of local and global computer networks, systems and software, the “cyber risk” of the municipal economy is multiplicative, which makes it systemic and international. Its essence is manifested both at the national and global levels through the impact on business, municipal and state authorities. Today, the existing pandemic contributes to an increase in the number of cyberattacks, which indicates an even gre
APA, Harvard, Vancouver, ISO, and other styles
7

Khaleel, Amal Hameed, and Iman Qays Abduljaleel. "Secure image hiding in speech signal by steganography-mining and encryption." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1692. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1692-1703.

Full text
Abstract:
<span>Information hiding techniques are constantly evolving due to the increased need for security and confidentiality. This paper proposes a working mechanism in three phases. The first phase includes scrambling the values of the gray image depending on a series of keys that are generated using a quantum chaotic map. The second phase generates hybrid keys by mixing a Zaslavsky and a 3D Hanon map that are used to encrypt the gray image values produced after the scramble. Finally, in the third phase, a new algorithm is suggested to hide the encrypted gray image at random locations within
APA, Harvard, Vancouver, ISO, and other styles
8

Hei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.

Full text
Abstract:
Android system has been one of the main targets of hacker attacks for a long time. At present, it is faced with security risks such as privilege escalation attacks, image tampering, and malicious programs. In view of the above risks, the current detection of the application layer can no longer guarantee the security of the Android system. The security of mobile terminals needs to be fully protected from the bottom to the top, and the consistency test of the hardware system is realized from the hardware layer of the terminal. However, there is not a complete set of security measures to ensure t
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Siew H., and Suparak Janjarasjit. "Insight into hackers’ reaction toward information security breach." International Journal of Information Management 49 (December 2019): 388–96. http://dx.doi.org/10.1016/j.ijinfomgt.2019.07.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks – security measures. Computer hackers"

1

Artore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.

Full text
Abstract:
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances
APA, Harvard, Vancouver, ISO, and other styles
3

Buys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.

Full text
Abstract:
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Fur
APA, Harvard, Vancouver, ISO, and other styles
4

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches f
APA, Harvard, Vancouver, ISO, and other styles
5

Kisakye, Alex. "An investigation into information security practices implemented by Research and Educational Network of Uganda (RENU) member institution." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004748.

Full text
Abstract:
Educational institutions are known to be at the heart of complex computing systems in any region in which they exist, especially in Africa. The existence of high end computing power, often connected to the Internet and to research network grids, makes educational institutions soft targets for attackers. Attackers of such networks are normally either looking to exploit the large computing resources available for use in secondary attacks or to steal Intellectual Property (IP) from the research networks to which the institutions belong. Universities also store a lot of information about their cur
APA, Harvard, Vancouver, ISO, and other styles
6

Dalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

LU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.

Full text
Abstract:
This dissertation concerns investigations on two of the most important problems in establishing communication security in computer networks: (1) developing a model which precisely describes the mechanism that enforces the security policy and requirements for a secure network, and (2) designing a key management scheme for establishing a secure session for end-to-end encryption between a pair of communicants. The security mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems attached to a computer communicat
APA, Harvard, Vancouver, ISO, and other styles
9

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO, and other styles
10

Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.

Full text
Abstract:
Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack life cycle. A particular challenge is to monitor for stealthy attempts deliberately designed to stay beneath detection thresholds. This doctoral research presents a theoretical framework for effective monitoring of such activities. The main contribution of this work is a scalable monitoring scheme proposed in a Bayesian framework, which allows for detection of multiple attackers by setting a threshold using the Grubbs’ test. Second contrib
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks – security measures. Computer hackers"

1

Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hacking: The art of exploitation. 2nd ed. No Starch Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Whitaker, Andrew. Chained exploits: Advanced hacking attacks from start to finish. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. 2nd ed. Course Technology, Cengage Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Christopher, Paggen, ed. LAN switch security: What hackers know about your switches. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hacking for dummies. 3rd ed. Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Live hacking. Ali Jahangiri, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Auerbach Publications, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chirillo, John. Hack attacks revealed: A complete reference for UNIX, Windows, and Linux with custom security toolkit. 2nd ed. Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. Course Technology, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks – security measures. Computer hackers"

1

Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Srinivasa Rao, B., and P. Premchand. "Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN." In Innovations in Computer Science and Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8201-6_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Parwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.

Full text
Abstract:
AbstractThe drive for automation and constant monitoring has led to rapid development in the field of Machine Learning (ML). The high accuracy offered by the state-of-the-art ML algorithms like Deep Neural Networks (DNNs) has paved the way for these algorithms to being used even in the emerging safety-critical applications, e.g., autonomous driving and smart healthcare. However, these applications require assurance about the functionality of the underlying systems/algorithms. Therefore, the robustness of these ML algorithms to different reliability and security threats has to be thoroughly studied and mechanisms/methodologies have to be designed which result in increased inherent resilience of these ML algorithms. Since traditional reliability measures like spatial and temporal redundancy are costly, they may not be feasible for DNN-based ML systems which are already super computer and memory intensive. Hence, new robustness methods for ML systems are required. Towards this, in this chapter, we present our analyses illustrating the impact of different reliability and security vulnerabilities on the accuracy of DNNs. We also discuss techniques that can be employed to design ML algorithms such that they are inherently resilient to reliability and security threats. Towards the end, the chapter provides open research challenges and further research opportunities.
APA, Harvard, Vancouver, ISO, and other styles
8

Cao, Xubin, and Yong Lu. "The Social Network Structure of a Computer Hacker Community." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch012.

Full text
Abstract:
Computer hackers, both individually and as a group, have been identified as a primary threat to computer systems, users, and organizations. Although hacker groups are complex socio-technical systems, much extant research on hackers is conducted from a technical perspective and at an individual level of analysis. This research proposes a research model composed of five dimensions and their relations in order to study hacker’s social organization in the whole socio-technical context. Based on this model, the researcher applies network analysis methods to disclose the structure and patterns of a significant and complex hacker group, Shadowcrew. Network analysis tools are applied for data processing and data analysis. Three network measures: degree centrality, cognitive demand, and eigenvector centrality, are utilized to determine the critical leaders. Out-degree centrality is employed to analyze the relations among the five dimensions in the research model.
APA, Harvard, Vancouver, ISO, and other styles
9

Garuba, Abdul Rahman. "Computer Virus Phenomena in Cybercafé." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch012.

Full text
Abstract:
The chapter examines the concepts, history, sources, spread, detection, and removal of computer viruses. The increase in the number of computers and accessibility to Internet has made it easy for hackers to invade systems all over the world. Computer viruses have reached epidemic numbers in many computer environments resulting in computer security vulnerabilities. Cybercafés systems/networks are potential objects of virus attacks due to the fact that they are connected to the Net. Cybercafé managers should have a good understanding of the risk and controls associated with various security technologies. It is the hope of the author that adequate awareness and understanding of the destructive devices by cybercafé managers and computer users generally will help secure their systems. It is recommended that cybercafé administrators develop a security policy for both employees and users.
APA, Harvard, Vancouver, ISO, and other styles
10

Adogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.

Full text
Abstract:
The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administration programs, unauthorized access, denial of service, and so forth, and equally suggests measures of protecting the computers or networks such as installation of firewalls, use of antivirus, avoidance of opening unknown attachments, disabling of hidden filename extensions, keeping all applications parched, disconnecting from the net when not in use, regular backup of data, virtual private networks, and so forth.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks – security measures. Computer hackers"

1

Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hidalgo-Espinoza, Sergio, Kevin Chamorro-Cupuerán, and Oscar Chang-Tortolero. "Intrusion Detection in Computer Systems by using Artificial Neural Networks with Deep Learning Approaches." In 10th International Conference on Advances in Computing and Information Technology (ACITY 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101501.

Full text
Abstract:
Intrusion detection into computer networks has become one of the most important issues in cybersecurity. Attackers keep on researching and coding to discover new vulnerabilities to penetrate information security system. In consequence computer systems must be daily upgraded using up-to-date techniques to keep hackers at bay. This paper focuses on the design and implementation of an intrusion detection system based on Deep Learning architectures. As a first step, a shallow network is trained with labelled log-in [into a computer network] data taken from the Dataset CICIDS2017. The internal beha
APA, Harvard, Vancouver, ISO, and other styles
4

Murray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.

Full text
Abstract:
Operations has grown beyond relying only on SCADA infrastructure — can you operate without your non-scada infrastructure? As the operator of the world’s longest and most complex liquids pipeline, Enbridge Pipelines Inc. relies heavily on automated systems to control, monitor, maintain our pipeline system. As the scope of automation continues to expand beyond the SCADA control system, so to does the dependence on ancillary computer applications such as pipeline scheduling, electronic ticketing, nominations and oil accounting. Uninterrupted operation of the pipeline system now depends on an incr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!