|
|
|
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ...
ver más
|
|
|
|
|
|
|
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n...
ver más
|
|
|
|
|
|
|
Carlos Enrique Montenegro,Paulo Alonso Gaona Garcia,Julio Barón Velandia. Universidad Distrital Francisco José de Caldas, Colombia
Pág. 101 - 114
Las honeynets son herramientas de seguridad informáticas muy usadas en la actualidad con el propósito de reunir información de posibles atacantes acerca de las vulnerabilidades presentes en nuestra red. Para realizar un correcto uso de ellas es necesario...
ver más
|
|
|
|