HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks (Englisch)
- Neue Suche nach: Huang, Xin
- Neue Suche nach: Yan, Fei
- Neue Suche nach: Zhang, Liqiang
- Neue Suche nach: Wang, Kai
- Neue Suche nach: Huang, Xin
- Neue Suche nach: Yan, Fei
- Neue Suche nach: Zhang, Liqiang
- Neue Suche nach: Wang, Kai
In:
Information Systems Frontiers
;
23
, 2
; 269-283
;
2020
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
-
Beteiligte:Huang, Xin ( Autor:in ) / Yan, Fei ( Autor:in ) / Zhang, Liqiang ( Autor:in ) / Wang, Kai ( Autor:in )
-
Erschienen in:Information Systems Frontiers ; 23, 2 ; 269-283
-
Verlag:
- Neue Suche nach: Springer US
- Neue Suche nach: Springer Science + Business Media B.V
-
Erscheinungsort:Dordrecht [u.a.]
-
Erscheinungsdatum:2020
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 06.74 / 54.64
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 23, Ausgabe 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 263
-
Seeking Foundations for the Science of Cyber SecurityXu, Shouhuai / Yung, Moti / Wang, Jingguo et al. | 2021
- 269
-
HoneyGadget: A Deception Based Approach for Detecting Code Reuse AttacksHuang, Xin / Yan, Fei / Zhang, Liqiang / Wang, Kai et al. | 2020
- 285
-
LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event ModelingXia, Bin / Bai, Yuxuan / Yin, Junjie / Li, Yun / Xu, Jian et al. | 2020
- 299
-
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and ClassificationRoy, Krishna Chandra / Chen, Qian et al. | 2020
- 317
-
Incentive Mechanism for Rational Miners in Bitcoin Mining PoolXue, Gang / Xu, Jia / Wu, Hanwen / Lu, Weifeng / Xu, Lijie et al. | 2020
- 329
-
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual CrimesSilic, Mario / Lowry, Paul Benjamin et al. | 2019
- 343
-
Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral ComplexityBurns, A. J. / Posey, Clay / Roberts, Tom L. et al. | 2019
- 361
-
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidenceKweon, Eunkyung / Lee, Hansol / Chai, Sangmi / Yoo, Kyeongwon et al. | 2019
- 375
-
Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming ApproachLiu, Qi / Feng, Gengzhong / Tayi, Giri Kumar / Tian, Jun et al. | 2019
- 391
-
Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production SystemsBerger, Stephan / Häckel, Björn / Häfner, Lukas et al. | 2019
- 415
-
Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence?Luong, Tan Trung / Sivarajah, Uthayasankar / Weerakkody, Vishanth et al. | 2019
- 435
-
The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical InvestigationPengnate, Supavich Fone / Sarathy, Rathindra / Arnold, Todd J. et al. | 2019
- 453
-
Accommodating Practices During Episodes of Disillusionment with Mobile ITZamani, Efpraxia D. / Pouloudi, Nancy / Giaglis, George / Wareham, Jonathan et al. | 2019
- 477
-
Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial MarketsClapham, Benjamin / Siering, Michael / Gomber, Peter et al. | 2019
- 495
-
Towards Increased Understanding of Open Data Use for Software DevelopmentGrzenda, Maciej / Legierski, Jaroslaw et al. | 2019