A taxonomy of cyber-harms: Defining the impacts of cyberattacks and understanding how they propagate, Journal of Cybersecurity, issue.1, p.4, 2018. ,
, Cyber-Attacks -Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, vol.28, pp.24-31, 2015.
Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution, International Journal of Advances in Computer Networks and Its Security (IJCNS), vol.7, issue.2, pp.27-31, 2017. ,
Cyber Harm: Concepts, Taxonomy and Measurement, SSRN Electronic Journal, 2016. ,
, Cyber Attacks, 2018.
Tor-based malware and Tor connection detection, International Conference on Frontiers of Communications, Networks and Applications, pp.1-6, 2014. ,
Common Types of Cybersecurity Attacks and Hacking Techniques, 2019. ,
Network Monitoring Approaches: An Overview, International Journal of Advances in Computer Networks and Its Security (IJCNS), vol.5, issue.2, pp.88-93, 2015. ,
Academic Research Reports Nearly 30,000 DoS Attacks per Day, 2019. ,
A survey of a distributed denial-of-service attack, prevention, and mitigation techniques, International Journal of Distributed Sensor Networks, vol.13, issue.12, p.155014771774146, 2017. ,
DNS query failure and algorithmically generated domain-flux detection, International Conference on Frontiers of Communications, Networks and Applications, pp.1-5, 2014. ,
What is a man-in-the-middle attack? How MitM attacks work and how to prevent them, 2019. ,
A Survey of Man In The Middle Attacks, IEEE Communications Surveys & Tutorials, vol.18, issue.3, pp.2027-2051, 2016. ,
Malicious File Hash Detection and Driveby Download Attacks, International Conference on Computer and Communication Technologies, series Advances in Intelligent Systems and Computing, vol.379, pp.661-669, 2016. ,
Cross-Site Scripting (XSS) Tutorial: Learn About XSS Vulnerabilities, Injections and How to Prevent Attacks, 2019. ,
, XSS Attacks, 2014.
A Survey on Intrusion Detection and Prevention Systems, IEEE/UREL conference, pp.10-14, 2014. ,
110 Must-Know Cybersecurity Statistics for 2020 | Varonis, 2019. ,
An IoT and Business Processes Based Approach for the Monitoring and Control of High Value-Added Manufacturing Processes, International Conference on Future Networks and Distributed Systems, 2017. ,
Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering, vol.362, pp.73-80, 2016. ,
Beware the drive-by attack, Computer Fraud & Security, issue.10, pp.19-20, 2016. ,
All Data Breaches in 2019 -An Alarming Timeline -SelfKey, 2019. ,
A Survey on Botnet Command and Control Traffic Detection, International Journal of Advances in Computer Networks and Its Security (IJCNS), vol.5, issue.2, pp.75-80, 2015. ,
, Design of Password Guessing Prevention Protocol for Levelled-Security System, vol.8, issue.5, pp.3787-3791, 2018.
A taxonomy of network and computer attacks, Computers & Security, vol.24, issue.1, pp.31-43, 2005. ,
Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat, International Conference on Future Networks and Distributed Systems, 2018. ,
A taxonomy and comparison of computer securityincidents from the commercial and government sectors, Computers and Security, vol.25, pp.522-538, 2005. ,
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence, International Conference on Future Networks and Distributed Systems, 2017. ,
A taxonomy of network and computer attacks, Computer and Security, 2005. ,
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, ACM CCR, 2004. ,
Advanced Persistent Threat and Spear Phishing Emails, International Conference Distance Learning, Simulation and Communication, pp.34-41, 2015. ,
A Taxonomy of Computer Attacks with Applications to Wireless Networks, 2001. ,
A Common Language for Computer Security Incidents, 1998. ,
BotDet: A System for Real Time Botnet Command and Control Traffic Detection, IEEE Access (IF=4.098), vol.6, pp.1-12, 2018. ,
Unidimensional Vertical Scaling in Multidimensional Space, ETS Research Report Series, vol.2017, issue.1, pp.1-28, 2017. ,
Facet Theory. Encyclopedia of Quality of Life and Well-Being Research, pp.2112-2119, 2014. ,