2016
DOI: 10.4018/978-1-5225-0105-3.ch020
|View full text |Cite
|
Sign up to set email alerts
|

Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms

Abstract: Numerous vulnerabilities have a tendency to taint modern real-world web applications, allowing attackers in retrieving sensitive information and exploiting genuine web applications as a platform for malware activities. Moreover, computing techniques are evolved from the large desktop computer systems to the devices like smartphones, smart watches and goggles. This needs to be ensure that these devices improve their usability and will not be utilized for attacking the personal credentilas (such as credit card n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The major reason for the effectiveness of Mirai Botnet is because of the easy installation of IoT devices, which were developed with minimal or no security concern and reduced cost [11]. A vulnerable IoT device is very risky, irrespective of its level of security [12]. There were nearly 10,263 botnets introduced in 2018 in various IoT devices [13].…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
See 1 more Smart Citation
“…The major reason for the effectiveness of Mirai Botnet is because of the easy installation of IoT devices, which were developed with minimal or no security concern and reduced cost [11]. A vulnerable IoT device is very risky, irrespective of its level of security [12]. There were nearly 10,263 botnets introduced in 2018 in various IoT devices [13].…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…Noisy samples which contribute to maximum redundancy and minimum contribution will be identified for removal. Hence, the objective function that can exclude a majority sample, from a pair which is redundant, (x u , x v ) where (1 < u, v ≤ j ≤ q) is represented by Equation (12) as…”
Section: Under-sampling Of Majority Samplesmentioning
confidence: 99%