Matches in SemOpenAlex for { <https://semopenalex.org/work/W3115803896> ?p ?o ?g. }
Showing items 1 to 62 of
62
with 100 items per page.
- W3115803896 endingPage "44" @default.
- W3115803896 startingPage "31" @default.
- W3115803896 abstract "Tracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continues to increase in direct proportion to the rate at which internet based services are deployed. In this systematic review, 53 research papers from reputable publishers were downloaded out of which 41 papers that are closely related to tracking of malicious attackers on encrypted data online were review under the consideration of attacks on encrypted data, and tracking malicious attacks; with respect to proposed technique, problem addressed, comparison to existing methodology, parameters used, major findings and then limitations and future knowledge. The authors then deduce the classification of four varying types of attacks (Keyword Guessing Attack, Selective opening attacks, Leakage-Abuse Attacks, and Key Reinstallation Attacks) from the review, to narrow down research into the future countermeasures for these attacks. 11 research papers actual discuss countermeasures for these classification types, with Keyword Guessing Attack being the focus of 6 research work, Selective Opening Attacks have 3 papers trying to solve vulnerabilities permitting such attacks, 2 papers aimed research solutions at Leakage-Abuse Attacks, and Key Reinstallation Attacks, has mention but none of the papers reviewed proffer mitigation techniques. The remaining 30 papers concentrated discussions on general attacks on encrypted data. Inclining future research attention to the four kinds of attacks against encrypted data will improve attack detection contrary to the commonly post-mortem approach." @default.
- W3115803896 created "2021-01-05" @default.
- W3115803896 creator A5015878218 @default.
- W3115803896 creator A5025580732 @default.
- W3115803896 creator A5046245071 @default.
- W3115803896 creator A5074104429 @default.
- W3115803896 date "2020-09-18" @default.
- W3115803896 modified "2023-09-25" @default.
- W3115803896 title "Tracking of Malicious Attacks on Data Online: A Systematic Review" @default.
- W3115803896 doi "https://doi.org/10.14738/tnc.84.9463" @default.
- W3115803896 hasPublicationYear "2020" @default.
- W3115803896 type Work @default.
- W3115803896 sameAs 3115803896 @default.
- W3115803896 citedByCount "0" @default.
- W3115803896 crossrefType "journal-article" @default.
- W3115803896 hasAuthorship W3115803896A5015878218 @default.
- W3115803896 hasAuthorship W3115803896A5025580732 @default.
- W3115803896 hasAuthorship W3115803896A5046245071 @default.
- W3115803896 hasAuthorship W3115803896A5074104429 @default.
- W3115803896 hasConcept C108827166 @default.
- W3115803896 hasConcept C110875604 @default.
- W3115803896 hasConcept C136764020 @default.
- W3115803896 hasConcept C148730421 @default.
- W3115803896 hasConcept C178489894 @default.
- W3115803896 hasConcept C26517878 @default.
- W3115803896 hasConcept C38652104 @default.
- W3115803896 hasConcept C41008148 @default.
- W3115803896 hasConcept C49289754 @default.
- W3115803896 hasConcept C65856478 @default.
- W3115803896 hasConcept C71745522 @default.
- W3115803896 hasConceptScore W3115803896C108827166 @default.
- W3115803896 hasConceptScore W3115803896C110875604 @default.
- W3115803896 hasConceptScore W3115803896C136764020 @default.
- W3115803896 hasConceptScore W3115803896C148730421 @default.
- W3115803896 hasConceptScore W3115803896C178489894 @default.
- W3115803896 hasConceptScore W3115803896C26517878 @default.
- W3115803896 hasConceptScore W3115803896C38652104 @default.
- W3115803896 hasConceptScore W3115803896C41008148 @default.
- W3115803896 hasConceptScore W3115803896C49289754 @default.
- W3115803896 hasConceptScore W3115803896C65856478 @default.
- W3115803896 hasConceptScore W3115803896C71745522 @default.
- W3115803896 hasIssue "4" @default.
- W3115803896 hasLocation W31158038961 @default.
- W3115803896 hasOpenAccess W3115803896 @default.
- W3115803896 hasPrimaryLocation W31158038961 @default.
- W3115803896 hasRelatedWork W2094340711 @default.
- W3115803896 hasRelatedWork W2181649187 @default.
- W3115803896 hasRelatedWork W2383950765 @default.
- W3115803896 hasRelatedWork W2389103123 @default.
- W3115803896 hasRelatedWork W2391717201 @default.
- W3115803896 hasRelatedWork W2414793018 @default.
- W3115803896 hasRelatedWork W306971091 @default.
- W3115803896 hasRelatedWork W3155357916 @default.
- W3115803896 hasRelatedWork W3184904781 @default.
- W3115803896 hasRelatedWork W3197761231 @default.
- W3115803896 hasVolume "8" @default.
- W3115803896 isParatext "false" @default.
- W3115803896 isRetracted "false" @default.
- W3115803896 magId "3115803896" @default.
- W3115803896 workType "article" @default.