Hackers Topology Matter Geography: Mapping the Dynamics of Repeated System Trespassing Events Networks
Abstract
References
- Hackers Topology Matter Geography: Mapping the Dynamics of Repeated System Trespassing Events Networks
Recommendations
Social psychology: an under-used tool in cybersecurity
HCI '16: Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion VolumeIn cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and ...
Exploring Defense of SQL Injection Attack in Penetration Testing
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed ...
Vulnerability Analysis of the Exposed Public IPs in a Higher Education Institution
ICCNS '20: Proceedings of the 2020 10th International Conference on Communication and Network SecurityPublic IP addresses from a private or public higher education institution receive large amounts of network traffic. However, the data network is vulnerable to the possibility of security attacks.
This study develops a case in a practical way based in ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 147Total Downloads
- Downloads (Last 12 months)7
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in