-
1رسالة جامعية
المؤلفون: Steadman, Jacob
المساهمون: Scott-Hayward, Sandra, Sezer, Sakir
مصطلحات موضوعية: SDN, network security, DNS, data exfiltration
-
2كتاب إلكتروني
المؤلفون: Kokas, Aynne, author
المصدر: Trafficking Data : How China Is Winning the Battle for Digital Sovereignty, 2022, ill.
-
3دورية أكاديمية
المؤلفون: Mu-Huan (Miles) Chung, Yuhong (Alisha) Yang, Lu Wang, Greg Cento, Khilan Jerath, Parwinder Taank, Abhay Raman, Jonathan H. Chan, Mark H. Chignell
المصدر: Heliyon, Vol 9, Iss 1, Pp e13025- (2023)
مصطلحات موضوعية: Security visualization, Situation awareness, Data exfiltration, Collaborative dashboard, Science (General), Q1-390, Social sciences (General), H1-99
وصف الملف: electronic resource
العلاقة: http://www.sciencedirect.com/science/article/pii/S2405844023002323Test; https://doaj.org/toc/2405-8440Test
-
4دورية أكاديمية
المؤلفون: Mundt, Michael, Baier, Harald
المصدر: 2277-548X ; 2320-8430 ; Mundt, Michael; Baier, Harald: Enabling Protection against Data Exfiltration by implementing ISO 27001:2022 update. In: International Journal on Cybernetics & Informatics Jg. 12 (2023) H. 5, International Conference on Computer Science and Software Engineering (CSSE 2023) : August 12-13, 2023, Virtual Conference, S. 43-59, DOI:10.5121/ijci.2023.120505. ISSN 2277-548X
مصطلحات موضوعية: ISO 27001:2022 Update, Data Exfiltration, Control 5.7 Threat Intelligence, Threat Simulation
العلاقة: http://athene-forschung.unibw.de/node?id=145787Test; https://doi.org/10.5121/ijci.2023.120505Test; https://ijcionline.com/paper/12/12523ijci05.pdfTest
الإتاحة: https://doi.org/10.5121/ijci.2023.120505Test
http://athene-forschung.unibw.de/node?id=145787Test
https://ijcionline.com/paper/12/12523ijci05.pdfTest -
5دورية أكاديمية
المؤلفون: Lang, Michael, Connolly, Lena, Taylor, Paul, Corner, Phillip J.
مصطلحات موضوعية: Security and privacy, Malware and its mitigation, Social aspects of security and privacy, Ransomware, pandemic, COVID-19, data exfiltration, security policies
وصف الملف: application/pdf
العلاقة: ACM Digital Threats: Research and Practice; Lang, Michael, Connolly, Lena, Taylor, Paul, & Corner, Phillip J. (2023). The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks. Digital Threats, 4(4), Article 52. doi:10.1145/3558006; http://hdl.handle.net/10379/17960Test
-
6دورية أكاديمية
المؤلفون: Daan Willems, Katharina Kohls, Bob van der Kamp, Harald Vranken
المصدر: Electronics; Volume 12; Issue 12; Pages: 2584
مصطلحات موضوعية: network intrusion detection, data exfiltration, autoencoder, anomaly detection
وصف الملف: application/pdf
العلاقة: Computer Science & Engineering; https://dx.doi.org/10.3390/electronics12122584Test
-
7دورية أكاديمية
المؤلفون: Bong Gon Kim, Young-Seob Cho, Seok-Hyun Kim, Hyoungshick Kim, Simon S. Woo
المصدر: IEEE Access, Vol 9, Pp 22894-22913 (2021)
مصطلحات موضوعية: DID, decentralized key management system (DKMS), universal resolver, blockchain, data exfiltration, blockchain redaction, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
8دورية أكاديمية
المؤلفون: Ya. V. Bubnov, N. N. Ivanov
المصدر: Informatika, Vol 17, Iss 3, Pp 78-86 (2020)
مصطلحات موضوعية: domain name system, computer network security, data exfiltration, text classification, convolutional neural network, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
9دورية أكاديمية
المؤلفون: Longlong Li, Yuliang Lu, Xuehu Yan, Dingwei Tan
المصدر: Mathematical Biosciences and Engineering, Vol 16, Iss 6, Pp 7458-7476 (2019)
مصطلحات موضوعية: covert channels, screen-camera communication, air-gapped, data exfiltration, Biotechnology, TP248.13-248.65, Mathematics, QA1-939
وصف الملف: electronic resource
العلاقة: https://www.aimspress.com/article/10.3934/mbe.2019374?viewType=HTMLTest; https://doaj.org/toc/1551-0018Test
-
10تقرير
مصطلحات موضوعية: concealment, censorship, censorship circumvention, obfuscation, steganography, information hiding, covert channel, data exfiltration, information security, network security, cyber security, traffic, tcp/ip, ARP, broadcasts, network protocols
العلاقة: https://zenodo.org/record/7503339Test; https://doi.org/10.48550/arXiv.2212.11850Test; oai:zenodo.org:7503339