Masquerade Attacks Against Security Software Exclusion Lists.
Timothy R. McIntoshJulian Jang-JaccardPaul A. WattersTeo SusnjakPublished in: Aust. J. Intell. Inf. Process. Syst. (2019)
Keyphrases
- computer security
- security vulnerabilities
- computer systems
- security risks
- security mechanisms
- security threats
- security protocols
- security measures
- anti virus
- security problems
- information security
- denial of service attacks
- cyber attacks
- software systems
- intrusion detection
- countermeasures
- java card
- security issues
- software development
- fault injection
- security breaches
- chosen plaintext
- dos attacks
- anomaly detection
- software architecture
- security flaws
- network security
- security policies
- secure routing
- malicious attacks
- security properties
- access control
- iso iec
- wireless sensor networks
- security management
- network services
- advanced encryption standard
- cryptographic algorithms
- malicious users
- stream cipher
- information leakage
- intrusion detection system
- network traffic
- cyber security