2021
DOI: 10.1016/j.matpr.2021.02.557
|View full text |Cite|
|
Sign up to set email alerts
|

WITHDRAWN: Best ways computation intelligent of face cyber attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 120 publications
(11 citation statements)
references
References 25 publications
0
9
0
2
Order By: Relevance
“…The government of all countries must ensure the attainment and maintenance of the security properties of the organization and user's assets against relevant security risks in the cyber environment (Ibikunle & Eweniyi, 2013). Tomšů, (2021) sees cyber security as body of rules put in place for the protection of the cyber space, and or body of technology, processes and practices designed to protect networks, computers, programs and data from attacks, damage, or unauthorized access (Alhayani, Abbas, Khutar & Mohammed, 2021).…”
Section: Data Securitymentioning
confidence: 99%
“…The government of all countries must ensure the attainment and maintenance of the security properties of the organization and user's assets against relevant security risks in the cyber environment (Ibikunle & Eweniyi, 2013). Tomšů, (2021) sees cyber security as body of rules put in place for the protection of the cyber space, and or body of technology, processes and practices designed to protect networks, computers, programs and data from attacks, damage, or unauthorized access (Alhayani, Abbas, Khutar & Mohammed, 2021).…”
Section: Data Securitymentioning
confidence: 99%
“…Elde edilen Ip adres aralığından angry ip scanner, nmap gibi bir yazılım ile bu aralıktaki tüm aktif cihazların adı, açık portları, MAC adresi, Ip adresi gibi bilgiler elde edilebilir. Erişilen ağdaki paketlerin içeriği ise wireshark gibi bir yazılım aracılığı ile incelenebilir [16].…”
Section: Siber Saldırı Süreciunclassified
“…Bilgisayar ve sunucuların açıklarını tespit etmek için farklı tarama araçları kullanılır. Bu sayede sistem ile ilgili zafiyetler elde edilir [16].…”
Section: Siber Saldırı Süreciunclassified
“…More attention is being paid to threat intelligence management systems, such as Intel Works, Soltra, Threat Stream, and Vor Stack, to name a few. Many security providers have defined cyber threat intelligence in a way that is tailored to fit their marketing and commercial plans [1]. Because there isn't much academic literature about CTI, there isn't a lot of clarity in the community about how threat information is defined, what standards are used, and how they are used.…”
Section: Introductionmentioning
confidence: 99%