Limpar
430 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Dedy Hariyadi,

Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal ... Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi ... informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang ...

Tópico(s): Decision Support System Applications

2019 - Pusat Layanan Difabel | JISKA (Jurnal Informatika Sunan Kalijaga)

Artigo Acesso aberto Revisado por pares

C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani,

Although a relatively simple form of hacking, website defacement can have severe consequences both for the websites ... fully explore the causes and correlates of website defacement. We consider whether variables derived from routine activity theory can be applied to understanding website defacement. Specifically, using a sample of websites that were ... s structural characteristics and the frequency of website defacement reported for the country. We find that website defacements are less likely to occur in the presence ...

Tópico(s): Spam and Phishing Detection

2019 - Taylor & Francis | Journal of Crime and Justice

Artigo Acesso aberto Revisado por pares

Xuan Dau Hoang, Ngoc Tuong Nguyen,

Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of ... and deployed for monitoring and detection of website defacement attacks, such as those based on checksum comparison, ... extensive computing resources. This paper proposes a hybrid defacement detection model based on the combination of the ... The machine learning-based component can effectively detect defacements for both static pages and dynamic pages. On ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2019 - Multidisciplinary Digital Publishing Institute | Computers

Jornais Acesso aberto

Reginald A. Luck, Mr. R. D. Clark,

... Which Depended on the House of Lords, Stamp Defacement, Hackenschmidt V. Madrali, Cedarville, Ship Coal MacHinery, Chinese ...

1906 - Gale Group | NCCO EuropeAfrica

Revisão Acesso aberto Revisado por pares

Mariam Albalawi, Rasha Aloufi, Norah Alamrani, Neaimh Albalawi, Amer Aljaedi, Adel R. Alharbi,

Web attacks and web defacement attacks are issues in the web security world. Recently, website defacement attacks have become the main security threats for many ... and governments that provide web-based services. Website defacement attacks can cause huge financial and data losses ... tools are used to detect and monitor website defacement attacks. However, some of the techniques can work ... on false alarms. Many techniques can detect web defacement. Some are based on available online tools and ... review of the previous works related to website defacement, comparing the works based on the accuracy results, ...

Tópico(s): Spam and Phishing Detection

2022 - Multidisciplinary Digital Publishing Institute | Electronics

Jornais Acesso aberto

... Legislation, Day by Day, Prisoner's Escape, Stamp Defacement, In Quarters Barrack and Bivouac, Young Thieves A ...

1906 - Gale Group | NCCO EuropeAfrica

Artigo Revisado por pares

Alberto Bartoli, Giorgio Davanzo, Eric Medvet,

Web site defacement has become a common threat for organizations exposed on the Web. Several statistics indicate the occurrence rate of these incidents but not how long these defacements typically last. The authors present the results of ... two-month study of more than 62,000 defacements to determine whether and when a reaction to a defacement occurs. Such reaction times tend to be unacceptably ...

Tópico(s): Digital and Cyber Forensics

2009 - IEEE Computer Society | IEEE Internet Computing

Artigo Revisado por pares

Giorgio Davanzo, Eric Medvet, Alberto Bartoli,

The defacement of web sites has become a widespread problem. Reaction to these incidents is often quite slow and ... in augmenting availability and performance monitoring services with defacement detection capabilities. Motivated by these considerations, in this ... when faced with the problem of detecting web defacements automatically. All these approaches construct a profile of ... 3 months and includesa set of 320 real defacements.

Tópico(s): Anomaly Detection Techniques and Applications

2011 - Elsevier BV | Expert Systems with Applications

Artigo Revisado por pares

Hyung-Jin Woo, Yeora Kim, Joseph R. Dominick,

Abstract Web defacement by hackers has been an emerging topic of concern among those in the online community. Hackers with different psychological motivations may produce different types of defacement. In this study, we content analyzed 462 defaced ... identity theory to predict the severity of the defacement according to the presumed motivations (political vs. personal) of the hackers. About 70% of the defacements could be classified as pranks, whereas the rest ... Web pages. Text is the preferred means of defacement. Those sites hacked by individuals with a political ...

Tópico(s): Misinformation and Its Impacts

2004 - Taylor & Francis | Media Psychology

Artigo

Hugo Hens,

Fungal defacement on the inside surface of exterior walls is a common complaint in buildings in both cool and ... performance requirements to minimize the risk of fungal defacement. The occurrence of fungal defacement is governed by a combination of ten parameters. ... thermal performances or ventilation flows to avoid fungal defacement.

Tópico(s): Building energy efficiency and sustainability

1999 - Taylor & Francis | HVAC&R Research

Jornais Acesso aberto

... Morning Service, Memoirs of Dr. Blenkinsop, The Arts Defacement of Pictures at the National Gallery, The Tooth ...

1852 - Gale Group | NCCO BritishPolitics

Artigo Acesso aberto Revisado por pares

Mee Lan Han, Byung Il Kwak, Huy Kang Kim,

... on the massive data-driven analysis of website defacement. Our primary aim in this study is to ... a proof of concept. The assessment of website defacement was performed through the similarity measure and the ... enables a better understanding and interpretation of website defacement and assists in inferring the hacker’s behavioural traits from the available evidence concerning website defacement. The results of the case studies demonstrate that ...

Tópico(s): Software Engineering Research

2019 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Steve van de Weijer, Thomas J. Holt, Rutger Leukfeldt,

... developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2, ... based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional ... population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices ... based on the frequency with which they performed defacements generally.

Tópico(s): Crime, Illicit Activities, and Governance

2021 - Elsevier BV | Computers in Human Behavior Reports

Artigo

Patrick D. Allen, Chris C. Demchak,

... il) websites were defaced out of 1,295 defacements in the Middle East, and additional sites were ... The two main types of attacks were website defacement and distributed denial of service (DDoS). Website defacements tend to focus on high-profile political sites, ... were curtailed for days because of repeated website defacements.9 Broadcast servers that hackers used to launch ...

Tópico(s): Cryptographic Implementations and Security

2003 - The MIT Press | Military review

Jornais Acesso aberto

W. REES JEFFREYS., JOHN B. CLARK HALL., EDWARD EAMES., ROBERT HARRISON., B.A.CANTAB., B., TWENTY YEARS' REGULAR., APRES LA GUERRE., EX-M.W.S., GERARD CLARK., D. M. MASON., RICHARDSON EVANS, , HENRY ROSE., HAYDN JONES. DAVID DAVIES. SYDNEY ROBINSON., A. FACT.,

... Medals For Home Service., Scenery Of The Thames. Defacement Of Banks In London., War Graves., The Transport ...

1919 - Gale Group | TDA

Artigo Revisado por pares

Alberto Bartoli, Giorgio Davanzo, Eric Medvet,

Web site defacement, the process of introducing unauthorized modifications to a Web site, is a very common form of attack. In ... framework that may constitute the basis for a defacement detection service capable of monitoring thousands of remote ... dynamic resources and a set of publicly available defacements. The results are very satisfactory: all attacks are ...

Tópico(s): Advanced Malware Detection Techniques

2010 - Association for Computing Machinery | ACM Transactions on Internet Technology

Artigo Revisado por pares

Thomas J. Holt, Max Kilger, Li-Chun Chiang, Chu-Sing Yang,

... been an increase in the use of Web defacements, where individuals post political or ideological messages on ... generally little research on the predictors of Web defacements against either domestic or foreign targets. This study ... and behavioral correlates of willingness to engage in defacements using a sample of university students in Taiwan ... for cybercrime increase individuals' willingness to engage in defacements.

Tópico(s): Social Media and Politics

2016 - Taylor & Francis | Deviant Behavior

Jornais Acesso aberto

Felix Raymer, Jos. N. Pearce, H. R. Poore, C. H. Claudy, W. A. McLean, C. A. L. Pearson, W. J. Brooke, H. W. Bennett, Wm. O. Meyer, Chon Coln,

... the July Issue of the Camera regarding the Defacement of Rural Scenery, Etc., by Pill and Cure- ...

1904 - Gale Group | NCCO Photography

Artigo Revisado por pares

Connie Gagliardi,

... Separation Wall, this article analyzes the proliferation of defacements of the Australian street artist LushSux's meme- ... visually tracing and analyzing these successive moments of defacement, this article ethnographically captures a popular performance of ... the borderlands of the Israeli Separation Wall. Celebrating defacement's generative power to create a new face, this article demonstrates how defacement was an assertive act of unmasking the raw ...

Tópico(s): Law in Society and Culture

2020 - Taylor & Francis | Visual Anthropology

Artigo Revisado por pares

Thomas J. Holt, Jin Ree Lee, Joshua D. Freilich, Steven M. Chermak, Johannes M. Bauer, Ruth Shillair, Arun Ross,

Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to ... Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking ... current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to ... target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically- ...

Tópico(s): Spam and Phishing Detection

2020 - Taylor & Francis | Terrorism and Political Violence

Artigo Revisado por pares

Thomas J. Holt, Noah D. Turner, Joshua D. Freilich, Steven M. Chermak,

... determine whether the characteristics of jihadi-inspired web defacements in the United States vary from all other defacements performed against IP addresses hosted within the United ... use a sample of over 2.2 million defacements reported by the independent website Zone-H. We ... that jihadi cyberattacks were rare among all the defacements performed in this 5-year period. Additionally, these ...

Tópico(s): Spam and Phishing Detection

2021 - SAGE Publishing | Social Science Computer Review