参考文献
|
-
方仁威(2016)。論社交工程安全威脅之研究。發展與前瞻學報,11,33-52。
連結:
-
吳嘉龍(2017)。針對網路惡意程式攻擊探討電腦風險管理與資訊安全技術因應研究。危機管理學刊,14(1),19-28。
連結:
-
吳嘉龍(2017)。針對勒索病毒惡意程式攻擊網路風險管理與資訊安全防護技術研究。危機管理學刊,14(2),23-31。
連結:
-
張宏昌(2017)。ccTLDs 在 DNSSEC 建置發展及推動現況之比較。資訊管理學報,24(2),185-208。
連結:
-
張志汖,林宜隆(2016)。行動惡意程式攻擊數位證據鑑識調查處理程序之研究。電腦稽核,33,1-21。
連結:
-
張腕純(2018)。個人資料外洩如何通知?參考歐盟 GDPR 之規範與指引。科技法律透析,30(2),33-42。
連結:
-
楊慶裕,郭家祥,吳信德(2019)。資安日誌管理暨惡意程式分析平台系統建置-以學校系所為例。資訊安全通訊,25(4),17-28。
連結:
-
劉祉君(2018)。基於瀏覽器之分散式阻斷服務攻擊防禦技術研究。資訊安全通訊,24(1),1-17。
連結:
-
蔡旻諺,徐禾瀚,卓信宏(2020)。基於卷積神經網路的低速阻斷服務攻擊檢測。資訊安全通訊,26(3),51-62。
連結:
-
Aidan, J. S.,Verma, H. K.,Awasthi, L. K.(2017).Comprehensive survey on petya ransomware attack.2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)
-
Aldhyani, T. H.,Alkahtani, H.(2023).Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model.Mathematics,11(1),233.
-
Alzahrani, A. O.,Alenazi, M. J.(2023).ML‐IDSDN: Machine learning based intrusion detection system for software‐defined network.Concurrency and Computation: Practice and Experience,35(1),1-19.
-
Ashraf, I.,Park, Y.,Hur, S.,Kim, S. W.,Alroobaea, R.,Zikria, Y. B.,Nosheen, S(2022).A survey on cyber security threats in IoT-enabled maritime industry.Ieee Transactions on Intelligent Transportation Systems,2677-2690.
-
Chaganti, R.,Suliman, W.,Ravi, V.,Dua, A.(2023).Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks.Information,14(1),41.
-
De Santis, G.,Lahmadi, A.,Francois, J.,Festor, O.(2016).Modeling of ip scanning activities with hidden markov models: Darknet case study.2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
-
Elamathi, M. U.,Aruna, M. A.(2023).An Effective Secure Mechanism For Phishing Attacks Using Machine Learning Approach.Journal of Pharmaceutical Negative Results,2724-2732.
-
Elkhail, A. A.,Lachtar, N.,Ibdah, D.,Aslam, R.,Khan, H.,Bacha, A.,Malik, H(2023).Seamlessly Safeguarding Data Against Ransomware Attacks.IEEE Transactions on Dependable and Secure Computing,20(1),1-16.
-
Gaylah, K. D.,Vaghela, R. S.(2023).Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers.Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022,Rajkot, India:
-
Gupta, B. B.,Tewari, A.,Jain, A. K.,Agrawal, D. P.(2017).Fighting against phishing attacks: state of the art and future challenges.Neural Computing and Applications,28,3629-3654.
-
Hasan, M. K.,Ghazal, T. M.,Saeed, R. A.,Pandey, B.,Gohel, H.,Eshmawi,Alkhassawneh, H. M.(2022).A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things.IET Communications,16(5),421-432.
-
Jain, A. K.,Gupta, B.(2022).A survey of phishing attack techniques, defence mechanisms and open research challenges.Enterprise Information Systems,16(4),527-565.
-
Khouzani, M.,Sarkar, S.,Altman, E.(2012).Maximum damage malware attack in mobile wireless networks.IEEE/ACM Transactions on Networking,20(5),1347-1360.
-
Lee, Y. Y.,Gan, C. L.,Liew, T. W.(2023).Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information.International Journal of Environmental Research and Public Health,20(4),3514.
-
Mohurle, S.,Patil, M.(2017).A brief study of wannacry threat: Ransomware attack 2017.International Journal of Advanced Research in Computer Science,8(5),1938-1940.
-
OMB. (2022). M-22-09: Zero Trust Security Practices for Federal Government Retrieved from https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf
-
Ometov, A.,Bezzateev, S.,Mäkitalo, N.,Andreev, S.,Mikkonen, T.,Koucheryavy, Y.(2018).Multi-factor authentication: A survey.Cryptography,2(1),1.
-
Pittman, J. M.(2023).,未出版
-
Rose, S.,Borchert, O.,Mitchell, S.,Connelly, S.(2020).,未出版
-
Talaei Khoei, T.,Kaabouch, N.(2023).A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems.Information,14(2),103.
-
WEF(2023).,World Economic Forum.
-
Yaseen, H. S.,Al-Saadi, A.(2023).Q-learning based distributed denial of service detection.International Journal of Electrical and Computer Engineering,13(1),972-986.
-
王平,劉佳琪(2015)。網路威脅分析與防禦評估。崑山科技大學學報,10,61-71。
-
余政倫(2022)。淺談新型態「資訊戰」及網路攻防結合。海軍學術雙月刊,56(2),68-83。
-
沈大白,黃追(2021)。審視 COVID-19 疫情下的網路威脅。會計研究月刊,425,69-74。
-
林宜隆(2022)。區域資安威脅-區塊鏈資安與安全防護管理。展望與探索月刊,20(10),49-64。
-
陳建智,蔡雨龍,周國森(2021)。開放網路架構異常流量之檢測技術。電工通訊季刊,2021(第 4 季),81-92。
-
楊昇原(2020)。淡江大資訊管理學系碩士在職專班。
-
楊英伸(2014)。小心默默窺剌著您的敵人因應全球惡意軟體攻擊新趨勢之技術及管理。證券服務,632,35-38。
-
劉嘉偉,張家瑍(2021)。面對中共網軍威脅國軍資訊網路安全之探討。海軍學術雙月刊,55(3),118-131。
-
蔡一郎(2019)。數位時代下的多層次防禦。國土及公共治理季刊,7(4),40-49。
-
蔡在昇(2020)。淺談科技與網路安全防護趨勢發展。海軍學術雙月刊,54(2),56-69。
-
蔡佳君(2020)。5G 網路安全與資安防護。臺灣經濟研究月刊,43(12),33-41。
-
蔡孟哲(2022)。淡江大學資訊工程學系碩士班。
-
蔡婉婷(2017)。網購個資外洩商家應負擔賠償之責。消費者報導雜誌,438,7-9。
|