Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
23
Page No.
7154 - 7158
References
Balazs, Z., 2014. Bypass Firewalls Application White Lists, Secure Remote Desktops in 20 Seconds. MRG Publisher, London, England,.
Huang, S.H., C. Lin, Z. Chen, X. Jiang and K. Wang
et al., 2009. Proxy-based security audit system for remote desktop access. Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN 2009), August 3-6, 2009, IEEE, Beijing, China, ISBN:978-1-4244-4581-3, pp: 1-5.
Karapanos, N., C. Marforio, C. Soriente and S. Capkun, 2015. Sound-proof: Usable two-factor authentication based on ambient sound. Proceedings of the 24th USENIX Symposium on Security, August 12-14, 2015, USENIX Publisher, Washington, DC., USA., ISBN:978-1-931971-232, pp: 483-498.
Longzheng, C., Y. Shengsheng and Z. Jing-Li, 2004. Research and implementation of remote desktop protocol service over SSL VPN. Proceedings of the International Conference on Services Computing, September 15-18, 2004, IEEE USA., pp: 502-505.
Peikari, C. and A. Chuvakin, 2004. Securuty Warrior. O’Reilly Media, Inc., Sebastopoly, California, ISBN:0-596-00545-8,.
Rouzaud, C.J. and N. Viot, 2007. Secured architecture for remote virtual desktops. Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), May 25, 2007, IEEE, France, Europe, ISBN:978-0-9785699-1-4, pp: 80-87.
SANS Institute, 2007. Windows remote desktop heroes and villains. SANS Institute, Boston, Massachusetts. https://www.sans.org/reading-room/whitepapers/windows/windows-remote-desktop-heroes-villains-2026.
US-CERT., 2014. Backoff point-of-sale malware. United States Computer Emergency Readiness Team, Washington, DC., USA. https://www.us-cert.gov/ncas/alerts/TA14-212A.
Whitman, M.E. and H.J. Mattord, 2011. Principles of Information Security. 4th Edn., Cengage Learning, Boston, Massachusetts, ISBN-13:978-1-111-13821-9, Pages: 623.