Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 2 SI
Page No. 2872 - 2877

Case Study of Application of Integrated Control and Management System Based on Inter-Collaboration Against Cyber Threat

Authors : Kyuil Kim, Wonhyuk Lee, Buseung Cho, Dongkyun Kim and Hyungwoo Park

References

Gandhi, R., A. Sharma, W. Mahoney, W. Sousan and Q. Zhu, et al., 2011. Dimensions of cyber-attacks: Cultural, social, economic and political. IEEE. Technol. Soc. Mag., 30: 28-38.
CrossRef  |  Direct Link  |  

Ghafir, I., V. Prenosil, J. Svoboda and M. Hammoudeh, 2016. A survey on network security monitoring system. Proceeding of the IEEE International Conference on Future Internet of Things and Cloud Workshops, August 22-24, 2016, IEEE, Vienna, Austria, ISBN:978-1-5090-3947-0, pp: 77-82.

Ko, S., K. Kim, Y. Lee and J. Song, 2014. A classification method of darknet traffic for advanced security monitoring and response. Lect. Notes Comput. Sci., 8836: 357-364.
CrossRef  |  Direct Link  |  

Lagraa, S. and J. Francois, 2017. Knowledge discovery of port scans from darknet. Proceedings of the 2017 IFIP-IEEE Symposium on Integrated Network and Service Management (IM), May 8-12, 2017, IEEE, Lisbon, Portugal, ISBN:978-1-5090-5658-3, pp: 935-940.

Moosavi, S.R., T.N. Gia, E. Nigussie, A.M. Rahmani and S. Virtanen et al., 2015. Session resumption-based end-to-end security for healthcare internet-of-things. Proceedings of the IEEE International Conference on Computer and Information Technology: Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), October 26-28, 2015, IEEE, Liverpool, England, ISBN:978-1-5090-0154-5, pp: 581-588.

Settanni, G., Y. Shovgenya, F. Skopik, R. Graf and M. Wurzenberger et al., 2017. Acquiring cyber threat intelligence through security information correlation. Proceedings of the 3rd IEEE International Conference on Cybernetics (CYBCONF’17), June 21-23, 2017, IEEE, Exeter, UK., ISBN:978-1-5386-2202-5, pp: 1-7.

Svoboda, J., I. Ghafir and V. Prenosil, 2015. Network monitoring approaches: An overview. Intl. J. Adv. Comput. Netw. Secur., 5: 88-93.
Direct Link  |  

Ye, Y., T. Li, D. Adjeroh and S.S. Iyengar, 2017. A survey on malware detection using data mining techniques. ACM. Comput. Surv., Vol. 50, 10.1145/3073559

Zavarsky, P. and D. Lindskog, 2016. Experimental analysis of ransomware on windows and android platforms: Evolution and characterization. Procedia Comput. Sci., 94: 465-472.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved