نتایج جستجو برای: malicious user
تعداد نتایج: 253175 فیلتر نتایج به سال:
Many information security specialists believe that promoting good end user behaviors and constraining bad end user behaviors provide one important method for making information security effective within organizations. Because of the important of end user security-related behaviors, having a systematic viewpoint on the different kinds of behavior that end users enact could provide helpful benefi...
Though popularly used for safe web browsing, blacklist-based filters have fundamental limitation in the “window of vulnerability”, the time between malicious website launch and blacklist update. An effective way of seamless protection is to use an add-on filter based on heuristics, but most of prior heuristics have offered the limited scope of protection against new attacks. Moreover, they have...
Mobile Agent (MA) is a software programs that lives in computer networks, performing its computations and moving from host to host as necessary to fulfil user goals. Autonomous behaviour of MA and the malicious environment of the internet give rise to various important security issues related with both MA and its host. Various researchers working in the areas have identified various threats and...
The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...
The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...
The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...
We analyze the software stack of popular mobile advertising libraries on Android and investigate how they protect the users of advertising-supported apps from malicious advertising. We find that, by and large, Android advertising libraries properly separate the privileges of the ads from the host app by confining ads to dedicated browser instances that correctly apply the same origin policy. We...
Malicious code is a way of attempting to acquire sensitive information by sending malicious code to the trustworthy entity in an electronic communication. JavaScript is the most frequently used command language in the web page environment. If the hackers misuse the JavaScript code there is a possibility of stealing the authentication and confidential information about an organization and user. ...
End user is the key module of a future vehicular network and safety and non safety applications mostly focuses on the user’s safety and comfortable during the journey. Security of these applications are very significant and these life saving messages cannot be altered by any attacker. The behavior of the user plays a vital role whiles communicating with other users in a network. Trusted users a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید