"וְהַסֵּעַ עֶגְלַת חַיָּיו": על מסעו של הסוס הטרויאני במאה ה-21 (2016-2004) - אחיה אדמוני

עמוד:495

495 Kaspersky, 2014 Kaspersky Security Bulletin 2014 . ( 2014 ) . Retrieved December https : / / securelist . com / files / 2014 / 12 / Kaspersky31, 2015, from - pdf - for - statistics - Overall - 2014 . - Bulletin - ecurityS . 2014 Kaspersky, 2015 Kaspersky Security Bulletin 2015 . ( 2015 ) . Retrieved September from https : / / www . kaspersky . com / blog / kaspersky - 2024, 13, security - bulletin - 2015 / 4908 / Khamadja, Adi & Logrippo, 2013 Khamadja, S . , Adi, K . & Logrippo, L . ( 2013 ) . Designing Flexible Access Control Models for the Cloud . In : Proceedings of the 6 th International Conference on Security of Information and Networks ( SIN 31' ) . ACM, New York, NY, USA, 225 - 232 . doi : 10 . 1145 / 2523514 . 2527005 Kim, Smith & Shin, Greedy Anomalies and Mobile Malware Variants . In : 2008 Kim, H . , Smith, J . & Shin, K . G . ( 2008 ) . Detecting Energy - Proceedings of the 6 th International Conference on Mobile Systems, Applications, and Services ( MobiSys 80' ) . ACM, New York, NY, USA, 17 - 20 June 2008, 239 - 252 . doi : 10 . 1145 / 1378600 . 1378627 Krebs, 2014 Krebs, B . ( 2014 ) . ‘Blackshades’ Trojan Users Had It Coming . Retrieved June, 20, 2024, From https : / / krebsonsecurity . com / 2014 / 05 / blackshades - trojan - users - had - it - coming / Krutz & Vines, Comprehensive Guide to Secure Cloud Computing . London : 2010 Krutz, R . L . , & Vines, R . D . ( 2010 ) . Cloud Security : A Wiley . Landwehr, Bull, McDermott & Choi, 1994 Landwehr, C . E . , Bull, A . R . , McDermott, J . P . & Choi, W . S . A Taxonomy of Computer Program Security . ) 1994 ( Flaws . ACM Computing Surveys, 26 ( 3 ) , 211 - 254 . doi : 10 . 1145 / 185403 . 185412 Lin et al . , 2015 Lin, Y . - B . , Lin, Y . - W . , Chih, C . - Y . , Li, T . - Y . , Tai, C . - C . , Wang, Y . - C . , Lin, F . J . , Kuo, H . - C . , Huang, C . - C . & Hsu, S . - C . ( 2015 ) . EasyConnect : A Management System for IoT Devices and Its Applications for Interactive Design and Art . Internet of Things Journal, IEEE, 2 ( 6 ) , 551 - 561 . doi : 10 . 1109 / JIOT . 2015 . 2423286 Linde, 1975 Linde, R . R . ( 1975 ) . Operating System Penetration . In : Proceedings of the May 19 - 22, 1975, National Computer

אדמוני, אריאל


לצפייה מיטבית ורציפה בכותר