نتایج جستجو برای: spying operation

تعداد نتایج: 211944  

Journal: :Proceedings for Annual Meeting of The Japanese Pharmacological Society 2020

Journal: :Journal of applied history 2021

Abstract Protests against racism erupt in cities across America. A White House, under siege, believes a vast conspiracy is at work, and, to uncover it, instigates policy spy on Americans. This not the United States 2020, but half century earlier. Using wealth of declassified records, this article explores domestic intelligence collection program ( CHAOS ) instigated by two successive US adminis...

2013
Wendy Ellens Piotr Zuraniewski Anna Sperotto Harm Schotanus Michel Mandjes Erik Meeuwissen

DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network f...

Journal: :IJT 2011
Xue Lin Rocci Luppicini

Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other...

Journal: :Information 2015
Gaute Wangen

The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...

2013
Aron Laszka Benjamin Johnson Jens Grossklags

Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more value over a longer period of time. These covert attacks come in multiple varieties, which can be categorized into two main types: targeted and non-targeted attacks. Targeted attacks include, for example, cyberespionage, while non-targeted attacks include botnet recruitm...

2012
Igor Kotenko Alexey Konovalov Andrey Shorov

The common use of computers, connected to the Internet, as well as insufficient level of security, allow malefactors to execute large-scale infrastructure attacks, engaging in criminal activity a huge number of computing nodes. Attacks of such type have been traditionally performing by botnets. There are examples of successful large-scale attacks fulfilled by armies of bots. For example, attack...

2004
Lin Deng Xiaoyong Chai Qingzhao Tan Wilfred Ng Dik Lun Lee

Most current metasearch engines provide uniform service to users but do not cater for the specific needs of individual users. To address this problem, research has been done on personalizing a metasearch engine. An interesting and practical approach is to optimize its ranking function using clickthrough data. However, it is still challenging to infer accurate user preferences from the clickthro...

2012
Yossi Gilad Amir Herzberg

We show how to exploit side-channels to identify clients without eavesdropping on the communication to the server, and without relying on known, distinguishable traffic patterns. We present different attacks, utilizing different side-channels, for two scenarios: a fully offpath attack detecting TCP connections, and an attack detecting Tor connections by eavesdropping only on the clients. Our at...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید