Characteristic of the modern types of spyware information programs
DOI:
https://doi.org/10.5281/zenodo.5660997Abstract
In this paper a characteristic of the modern types of spyware information programs is made.
Downloads
References
Боянов, П. Кибератаки и противодействие. Монография. Шумен: Епископ Константин Преславски, 2017, 210 с. ISBN 978-619-201-206-9.
Савов, И. Относно някои аспекти от процедурите по използване на трафичните данни в Република България и някои европейски страни. – В: Международна конференция „Противодействие на радикализацията и тероризма“, Академия на МВР, април 2017 г. ISBN 978-954-348-145-3.
Савов, И. Един поглед върху същността на киберпрестъпленията. – В: Политика и сигурност, ВУСИ, 2017. ISSN 2535-0358.
Ташева, Ж. Н., П. Кр. Боянов. Сравнителен анализ на злонамерени уеббазирани атаки. – В: Научна конференция на тема „Защитата на личните данни в контекста на информационната сигурност“. Факултет „Артилерия, ПВО и КИС“ при Националния военен университет „Васил Левски“, Шумен, 6 – 7 юни 2013. ISBN 978-954-9681-49-9.
Allen, L. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Birmingham, UK: Packt Publishing, 2012. ISBN 978-1-84951-774-4.
Bodmer, S., M. Kilger, Gr. Carpenter, J. Jones. Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill Education, 2012. ISBN 978-0-07-177250-1.
Boyanov, P. Educational exploiting the information resources and invading the security mechanisms of the operating system Windows 7 with the exploit Eternalblue and Backdoor Doublepulsar. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 14, 2018. ISSN 1314-6289. [online]. http://www.rst-tto.com/publication.html.
Boyanov, P. A taxonomy of the cyber attacks. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 3, 2013. ISSN 1314-6289. [online]. http://www.rst-tto.com/publication.html.
Kahya-Özyirmidokuz, E., A. Gezer, C. Ciflikli. Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application. – In: Data Analytics, The First International Conference on Data Analytics, September, 2012. ISBN 978-1-61208-242-4.
Kaur, R., G. Singh. Analysing, Port Scanning Tools and Security Techniques. – In: International Journal of Electrical Electronics & Computer Science Engineering, Vol. 1, Issue 5, October 2014. ISSN 2348 2273.
Meyers, C., S. Powers, D. Faissol. Probabilistic Characterization of Adversary Behavior in Cyber Security. No. LLNL-TR-419023. – In: Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2009.
Meyers, C., S. Powers, D. Faissol. Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. – In: Lawrence Livermore National Laboratory, April 2009, Vol. 7.
Nachev, A., S. Zhelezov. Assessing the efficiency of information protection systems in the computer systems and networks. – In: Information Technology and Security, No. 1(3), 2013.
Oram, A., J. Viega. Beautiful Security. – In: O’Reilly Media, 2009. ISBN 978-0-596-52748-8.
Savov, I. The collision of national Security and Privacy in the age of information technologies. – In: European Police Science and Research Bulletin, European Union Agency for Law Enforcement Training, 2017. ISSN 2443-7883.
Shimeall, T. J., J. M. Spring. Introduction to Information Security: A Strategic-Based Approach. Syngress, 2014. ISBN 978-1-59749-969-9.
Simmons, C., S. Shiva, D. Dasgupta, Q. Wu. AVOIDIT: A cyber attack taxonomy. University of Memphis. – In: Proceedings of the 9th Annual Symposium on Information Assurance (ASIA ’14), Albany, NY, USA, June 3 – 4, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2019 2019

This work is licensed under a Creative Commons Attribution 4.0 International License.

