Literatura científica selecionada sobre o tema "Defacement of"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Defacement of".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Defacement of"

1

Hoang, Xuan Dau, e Ngoc Tuong Nguyen. "Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures". Computers 8, n.º 2 (8 de maio de 2019): 35. http://dx.doi.org/10.3390/computers8020035.

Texto completo da fonte
Resumo:
Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of websites, including immediate interruption of website operations and damage of the owner reputation, which may result in huge financial losses. Many solutions have been researched and deployed for monitoring and detection of website defacement attacks, such as those based on checksum comparison, diff comparison, DOM tree analysis, and complicated algorithms. However, some solutions only work on static websites and others demand extensive computing resources. This paper proposes a hybrid defacement detection model based on the combination of the machine learning-based detection and the signature-based detection. The machine learning-based detection first constructs a detection profile using training data of both normal and defaced web pages. Then, it uses the profile to classify monitored web pages into either normal or attacked. The machine learning-based component can effectively detect defacements for both static pages and dynamic pages. On the other hand, the signature-based detection is used to boost the model’s processing performance for common types of defacements. Extensive experiments show that our model produces an overall accuracy of more than 99.26% and a false positive rate of about 0.27%. Moreover, our model is suitable for implementation of a real-time website defacement monitoring system because it does not demand extensive computing resources.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Bergadano, Francesco, Fabio Carretto, Fabio Cogno e Dario Ragno. "Defacement Detection with Passive Adversaries". Algorithms 12, n.º 8 (29 de julho de 2019): 150. http://dx.doi.org/10.3390/a12080150.

Texto completo da fonte
Resumo:
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Young, Kevin. "Defacement". Callaloo 20, n.º 2 (1997): 292–93. http://dx.doi.org/10.1353/cal.1997.0067.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Barber, Charles. "Defacement". Yearbook of Comparative Literature 56, n.º 1 (2010): 104–15. http://dx.doi.org/10.1353/cgl.2010.0011.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Hariyadi, Dedy. "Analisis Serangan Web Defacement pada Situs Web Pemerintah Menggunakan ELK Stack". JISKA (Jurnal Informatika Sunan Kalijaga) 4, n.º 1 (16 de novembro de 2019): 1. http://dx.doi.org/10.14421/jiska.2019.41-01.

Texto completo da fonte
Resumo:
Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal dan eksternal. Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi khusus untuk mendapatkan informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang didapatkan selanjutnya diolah menggunakan ELK Stack untuk mempermudah analisis dalam bentuk visualisasi pada Dashboard.Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal dan eksternal. Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi khusus untuk mendapatkan informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang didapatkan selanjutnya diolah menggunakan ELK Stack untuk mempermudah analisis dalam bentuk visualisasi pada Dashboard.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Albalawi, Mariam, Rasha Aloufi, Norah Alamrani, Neaimh Albalawi, Amer Aljaedi e Adel R. Alharbi. "Website Defacement Detection and Monitoring Methods: A Review". Electronics 11, n.º 21 (1 de novembro de 2022): 3573. http://dx.doi.org/10.3390/electronics11213573.

Texto completo da fonte
Resumo:
Web attacks and web defacement attacks are issues in the web security world. Recently, website defacement attacks have become the main security threats for many organizations and governments that provide web-based services. Website defacement attacks can cause huge financial and data losses that badly affect the users and website owners and can lead to political and economic problems. Several detection techniques and tools are used to detect and monitor website defacement attacks. However, some of the techniques can work on static web pages, dynamic web pages, or both, but need to focus on false alarms. Many techniques can detect web defacement. Some are based on available online tools and some on comparing and classification techniques; the evaluation criteria are based on detection accuracies with 100% standards and false alarms that cannot reach 1.5% (and never 2%); this paper presents a literature review of the previous works related to website defacement, comparing the works based on the accuracy results, the techniques used, as well as the most efficient techniques.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Aryapranata, Ariawan, Sigit Hermanto, Yogi Priya Agsena, Yuliansyah Al Rasyid e Fachrul Husain Habibie. "Pencegahan Web Defacement". Jurnal Esensi Infokom : Jurnal Esensi Sistem Informasi dan Sistem Komputer 8, n.º 1 (31 de maio de 2024): 10–19. http://dx.doi.org/10.55886/infokom.v8i1.816.

Texto completo da fonte
Resumo:
Meningkatnya penggunaan internet memiliki risiko semakin masifnya ancaman peretasan. Badan Siber dan Sandi Negara (BSSN) mencatat hingga April 2022, serangan siber di Indonesia mencapai angka 100 juta kasus. Web defacement selalu masuk ke dalam tiga teratas insiden yang masuk dalam layanan BSSN, Web Defacement adalah tindakan merusak dan mengubah tampilan website, dan dapat merusak reputasi bisnis serta mengancam kepercayaan pengunjung. Metode penelitian tindakan (action Research) digunakan untuk langkah-langkah penerapan pencegahan web defacement yang menjadi bagian integral dari strategi keamanan website.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mantzios, George. "Cold War image-myths: A crime scene ethnography of defacement and historical redress from Athens, Greece". International Journal of Cultural Studies 24, n.º 5 (5 de março de 2021): 749–66. http://dx.doi.org/10.1177/1367877921996371.

Texto completo da fonte
Resumo:
This article develops an experimental ethnographic investigation into defacement as a popular modality of historical redress. It takes as its point of departure artistic remediations of archival materials pertaining to the commission, transport, and defacement of the statue of Harry S. Truman in Athens, Greece. At the forefront of the analysis is a consideration of such artistic remediations as extensions of the acts of defacement they (re)present. A political aesthetics of defacement is then elaborated through an experimental ethnography of Cold War historical redress centered around a crime scene investigation into the whereabouts and status of Harry S. Truman in present-day Athens. The experiment involves shifting the terms of historical redress from a focus on the statue of Harry S. Truman as a historiographical object of analytical study to the phantasmagoric modes of its ongoing defacement and (re)presentations in and from post-war Greece.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Zayid, Elrasheed, Ibrahim Isah, Nadir Farah, Yagoub Adam e Omar Alshehri. "Exploiting the Capabilities of Classifiers to Examine a Website Defacement Data Set". International Journal of Computers and Informatics 3, n.º 3 (31 de março de 2024): 9–41. http://dx.doi.org/10.59992/ijci.2024.v3n3p1.

Texto completo da fonte
Resumo:
Website defacement is the illegal electronic act of changing a website. In this paper, the capabilities of robust machine learning classifiers are exploited to select the best input feature set for evaluation of a website’s defacement risk. A defacement mining data set was obtained from Zone-H, a private organization, and a sample consisting of 93,644 data points was pre-processed and used for modelling purposes. Using multi-dimensional features as input, enormous modelling computations were carried out to determine the optimal outputs, in terms of performance. Reason and hackmode presented the highest contributions for the evaluation of website defacement, and were thus chosen as outputs. Various machine learning models were examined, and decision tree (DT), k-nearest neighbours (k-NN), and random forest (RF) were found to be the most powerful algorithms for prediction of the target model. The input variables 'domain', 'system', 'web_server', 'redefacement', 'type', 'def_grade', and 'reason/hackmode' were tested and used to shape the final model. Using the cross-validation (CV) technique, the key performance factors of the models were calculated and reported. After calculating the average scores for the hyperparameter metrics (i.e., max-depth, min-sample-leaf, weight, max-features, and CV), both targets were evaluated, and the learning algorithms were ranked as RF > DT > k-NN. The reason and hackmode variables were thoroughly analysed, and the average score accuracies for the reason and hackmode targets were 0.85 and 0.585, respectively. The results comprise a significant development, in terms of modelling and optimizing website defacement risk. This study successfully addresses key cybersecurity concerns, particularly website defacement.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Davidson, Tonya. "Mica, Pedagogy, and Defacement". Public Historian 38, n.º 2 (1 de maio de 2016): 42–61. http://dx.doi.org/10.1525/tph.2016.38.2.42.

Texto completo da fonte
Resumo:
This article examines four interactions with Canada’s National War Memorial: ongoing skateboarding, an act of public urination in 2006, the 2008 “Vigil Project,” and the 2006 placement of the Valiants Memorial. It argues that these interactions with the monument demonstrate its potential as a site at which to learn about Canada’s military past and to embody the memories of others, thereby learning from the past. These types of learning are possible because the monument operates as an assemblage of material and virtual components.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Defacement of"

1

Davanzo, Giorgio. "Machine learning in engineering applications". Doctoral thesis, Università degli studi di Trieste, 2011. http://hdl.handle.net/10077/4520.

Texto completo da fonte
Resumo:
2009/2010
Nowadays the available computing and information-storage resources grew up to a level that allows to easily collect and preserve huge amount of data. However, several organizations are still lacking the knowledge or the tools to process these data into useful informations. In this thesis work we will investigate several issues that can be solved effectively by means of machine learning techniques, ranging from web defacement detection to electricity prices forecasting, from Support Vector Machines to Genetic Programming. We will investigate a framework for web defacement detection meant to allow any organization to join the service by simply providing the URLs of the resources to be monitored along with the contact point of an administrator. Our approach is based on anomaly detection and allows monitoring the integrity of many remote web resources automatically while remaining fully decoupled from them, in particular, without requiring any prior knowledge about those resources—thus being an unsupervised system. Furthermore, we will test several machine learning algorithms normally used for anomaly detection on the web defacement detection problem. We will present a scrolling system to be used on mobile devices to provide a more natural and effective user experience on small screens. We detect device motion by analyzing the video stream generated by the camera and then we transform the motion in a scrolling of the content rendered on the screen. This way, the user experiences the device screen like a small movable window on a larger virtual view, without requiring any dedicated motion-detection hardware. As regards information retrieval, we will present an approach for information extraction for multi-page printed document; the approach is designed for scenarios in which the set of possible document classes, i.e., document sharing similar content and layout, is large and may evolve over time. Our approach is based on probability: we derived a general form for the probability that a sequence of blocks contains the searched information. A key step in the understanding of printed documents is their classification based on the nature of information they contain and their layout; we will consider both a static and a dynamic scenario, in which document classes are/are not known a priori and new classes can/can not appear at any time. Finally, we will move to the edge of machine learning: Genetic Programming. The electric power market is increasingly relying on competitive mechanisms taking the form of day-ahead auctions, in which buyers and sellers submit their bids in terms of prices and quantities for each hour of the next day. We propose a novel forecasting method based on Genetic Programming; key feature of our proposal is the handling of outliers, i.e., regions of the input space rarely seen during the learning.
Oggigiorno le risorse disponibili in termini computazionali e di archiviazione sono cresciute ad un livello tale da permettere facilmente di raccogliere e conservare enormi quantità di dati. Comunque, molte organizzazioni mancano ancora della conoscenza o degli strumenti necessari a processare tali dati in informazioni utili. In questo lavoro di tesi si investigheranno svariati problemi che possono essere efficacemente risolti attraverso strumenti di machine learning, spaziando dalla rilevazione di web defacement alla previsione dei prezzi della corrente elettrica, dalle Support Vector Machine al Genetic Programming. Si investigherà una infrastruttura per la rilevazione dei defacement studiata per permettere ad una organizzazione di sottoscrivere il servizio in modo semplice, fornendo l'URL da monitorare ed un contatto dell'amministratore. L'approccio presentato si basa sull'anomaly detection e permette di monitorare l'integrità di molte risorse web remote in modo automatico e sconnesso da esse, senza richiedere alcuna conoscenza a priori di tali risorse---ovvero, realizzando un sistema non supervisionato. A questo scopo verranno anche testati vari algoritmi di machine learning solitamente usati per la rilevazione di anomalie. Si presenterà poi un sistema di scorrimento da usare su dispositivi mobili capace di fornire una interfaccia naturale ed efficace anche su piccoli schermi. Il sistema rileva il movimento del dispositivo analizzando il flusso video generato dalla macchina fotografica integrata, trasformando lo spostamento rilevato in uno scorrimento del contenuto visualizzato sullo schermo. In questo modo, all'utente sembrerà che il proprio dispositivo sia una piccola finestra spostabile su una vista virtuale più ampia, senza che sia richiesto alcun dispositivo dedicato esclusivamente alla rilevazione dello spostamento. Verrà anche proposto un sistema per l'estrazione di informazioni da documenti stampati multi pagina; l'approccio è studiato per scenari in cui l'insieme di possibili classi di documenti (simili per contenuto ed organizzazione del testo) è ampio e può evolvere nel tempo. L'approccio si basa sulla probabilità: è stata studiata la probabilità che una sequenza di blocchi contenga l'informazione cercata. Un elemento chiave nel comprendere i documenti stampati è la loro classificazione in base alla natura delle informazioni che contengono e la loro posizione nel documento; verranno considerati sia uno scenario statico che uno dinamico, in cui il numero di classi di documenti è/non è noto a priori e nuove classi possono/non possono apparire nel tempo. Infine, ci si muoverà verso i confini del machine learning: il Genetic Programming. Il mercato della corrente elettrica si basa sempre più su aste in cui ogni giorno venditori ed acquirenti fanno delle offerte per l'acquisto di lotti di energia per il giorno successivo, con una granularità oraria della fornitura. Verrà proposto un nuovo metodo di previsione basato sul Genetic Programming; l'elemento chiave della soluzione qui presentata è la capacità di gestire i valori anomali, ovvero valori raramente osservati durante il processo di apprendimento.
XXIII Ciclo
1981
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Medvet, Eric. "Techniques for large-scale automatic detection of web site defacements". Doctoral thesis, Università degli studi di Trieste, 2008. http://hdl.handle.net/10077/2579.

Texto completo da fonte
Resumo:
2006/2007
Web site defacement, the process of introducing unauthorized modifications to a web site, is a very common form of attack. This thesis describes the design and experimental evaluation of a framework that may constitute the basis for a defacement detection service capable of monitoring thousands of remote web sites sistematically and automatically. With this framework an organization may join the service by simply providing the URL of the resource to be monitored along with the contact point of an administrator. The monitored organization may thus take advantage of the service with just a few mouse clicks, without installing any software locally nor changing its own daily operational processes. The main proposed approach is based on anomaly detection and allows monitoring the integrity of many remote web resources automatically while remaining fully decoupled from them, in particular, without requiring any prior knowledge about those resources. During a preliminary learning phase a profile of the monitored resource is built automatically. Then, while monitoring, the remote resource is retrieved periodically and an alert is generated whenever something "unusual" shows up. The thesis discusses about the effectiveness of the approach in terms of accuracy of detection---i.e., missed detections and false alarms. The thesis also considers the problem of misclassified readings in the learning set. The effectiveness of anomaly detection approach, and hence of the proposed framework, bases on the assumption that the profile is computed starting from a learning set which is not corrupted by attacks; this assumption is often taken for granted. The influence of leaning set corruption on our framework effectiveness is assessed and a procedure aimed at discovering when a given unknown learning set is corrupted by positive readings is proposed and evaluated experimentally. An approach to automatic defacement detection based on Genetic Programming (GP), an automatic method for creating computer programs by means of artificial evolution, is proposed and evaluated experimentally. Moreover, a set of techniques that have been used in literature for designing several host-based or network-based Intrusion Detection Systems are considered and evaluated experimentally, in comparison with the proposed approach. Finally, the thesis presents the findings of a large-scale study on reaction time to web site defacement. There exist several statistics that indicate the number of incidents of this sort but there is a crucial piece of information still lacking: the typical duration of a defacement. A two months monitoring activity has been performed over more than 62000 defacements in order to figure out whether and when a reaction to the defacement is taken. It is shown that such time tends to be unacceptably long---in the order of several days---and with a long-tailed distribution.
Il web site defacement, che consiste nell'introdurre modifiche non autorizzate ad un sito web, è una forma di attacco molto comune. Questa tesi descrive il progetto, la realizzazione e la valutazione sperimentale di una sistema che può costituire la base per un servizio capace di monitorare migliaia di siti web remoti in maniera sistematica e automatica. Con questo sistema un'organizzazione può avvalersi del servizio semplicemente fornendo l'URL della risorsa da monitorare e un punto di contatto per l'amministratore. L'organizzazione monitorata può quindi avvantaggiarsi del servizio con pochi click del mouse, senza dover installare nessun software in locale e senza dover cambiare le sue attività quotidiane. Il principale approccio proposto è basato sull'anomaly detection e permette di monitorare l'integrita di molte risorse web remote automaticamente rimanendo completamente distaccato da queste e, in particolare, non richiedendo nessuna conoscenza a priori delle stesse. Durante una fase preliminare di apprendimento viene generato automaticamente un profilo della risorsa. Successivamente, durante il monitoraggio, la risorsa è controllata periodicamente ed un allarme viene generato quando qualcosa di "unusuale" si manifesta. La tesi prende in considerazione l'efficacia dell'approccio in termini di accuratezza di rilevamento---cioè, attacchi non rilevati e falsi allarmi generati. La tesi considera anche il problema dei reading mal classificati presenti nel learning set. L'efficiacia dell'approccio anomaly detection, e quindi del sistema proposto, si basa sull'ipotesi che il profilo è generato a partire da un learning set che non è corrotto dalla presenza di attacchi; questa ipotesi viene spesso data per vera. Viene quantificata l'influenza della presenza di reading corrotti sull'efficacia del sistema proposto e viene proposta e valutata sperimentalmente una procedura atta a rilevare quando un learning set ignoto è corrotto dalla presenza di reading positivi. Viene proposto e valutato sperimentalmente un approccio per la rilevazione automatica dei defacement basato sul Genetic Programming (GP), un metodo automatico per creare programmi in termini di evoluzione artificiale. Inoltre, vengono valutate sperimentalmente, in riferimento all'approccio proposto, un insieme di tecniche che sono state utilizzate per progettare Intrusion Detection Systems, sia host based che network-based. Infine, la tesi presenta i risultati di uno studio su larga scala sul tempo di reazione ai defacement. Ci sono diverse statistiche che indicano quale sia il numero di questo tipo di attacchi ma manca un'informazione molto importante: la durata tipica di un defacement. Si è effettuato un monitoraggio di oltre 62000 pagine defacciate per circa due mesi per scoprire se e quando viene presa una contromisura in seguito ad un defacement. Lo studio mostra che i tempi sono inaccettabilmente lunghi---dell'ordine di molti giorni---e con una distribuzione a coda lunga.
XX Ciclo
1979
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Scott, Helen E. "Confronting nightmares : responding to iconoclasm in Western museums and art galleries". Thesis, St Andrews, 2009. http://hdl.handle.net/10023/788.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Cucuzzella, Jean Moore. "The Destruction of the Imagery of Saint Thomas Becket". Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278647/.

Texto completo da fonte
Resumo:
This thesis analyzes the destruction of imagery dedicated to Saint Thomas Becket in order to investigate the nature of sixteenth-century iconoclasm in Reformation England. In doing so, it also considers the veneration of images during the late Middle Ages and the Renaissance. Research involved examining medieval and sixteenth-century historical studies concerning Becket's life and cult, anti-Becket sentiment prior to the sixteenth century, and the political circumstances in England that led to the destruction of shrines and imagery. This study provides insight into the ways in which religious images could carry multifaceted, ideological significance that represented diversified ideas for varying social strata--royal, ecclesiastical and lay.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Wu, Meng-jung, e 吳孟容. "WsP: A Websites Protector against Web Defacement Attacks". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/97189847976160234384.

Texto completo da fonte
Resumo:
碩士
國立中央大學
資訊工程研究所
96
Along with the fast development of Internet, the web servers become the important platforms of learning, educating, entertainment, information exchange and commercial service. Because of the growing importance of the web pages, altering web pages becomes the way that the attackers destroy the image of enterprises or expresses different ideology. In addition, more and more attackers intrude the web server and do not change web pages appear on the browser, but to alter the web pages make the original web pages become fishing pages or insert the command of downloading files in the web pages. As the user browses the web pages its browser downloads the malware which the attackers set up to user’s computer automatically and the malware may carry out broken or stolen the user’s data or even capture the control of user''s computer and then user''s computer becomes the springboard of next attacks. On the basis of the reasons of the above, how to prevent web pages to be defaced fast and effectively turn into a very important thing. In this research ,we propose a protect mechanism which is based on operating system kernel against web defacement attacks-- WsP(Websites Protector). WsP is base on malbehavior approach to detect attacks, even the attackers utilizes the loophole of web servers, eg.the buffer overflow vulnerability of Apache web server, to attack web servers and then gain Super User privileges of the servers.The attacker still unable to deface web pages directly unless the attacker start new operating system but this action will possibly cause the systematic administrator’s attention. Our mechanism at the same time dose not change the existing administrator''s management, that is to say, our mechanism is totally transparent and unfeeling for user but WsP can resist the attacker’s attacks accurately.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Tsai, Yueh-chi, e 蔡岳記. "High Availability-based Self-Recovery System for Web Defacement". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/07166903681575489598.

Texto completo da fonte
Resumo:
碩士
逢甲大學
資訊電機工程碩士在職專班
99
Web defacement is a kind of remote attacks that subverts web contents of a web site by exploiting system vulnerabilities. Although some researches focus their solutions on feature match of integrity of web pages, they lack of system availability and serviceability while web defacement occurs and lack of automatic self-recovery in real-time. Here we propose an approach called High-Availability Based Self-Recovery System (HASRS) to achieve the goal of fast service handoff and self-recovery. Based on the concept of “Intrusion Tolerance”, we assume the web server will always be compromised under undetected intrusion. To restrict attack time , we set time slice(ΔT)to force periodic service takeover among cluster nodes. Within ΔT , while the web server is brought offline to do self-recovery of web contents, other nodes will select one to be brought online to take over the web service. Our approach shows self-recovery and service handoff are executed automatically and periodically according to the time slice we set, regardless the web defacement occurs or not, and the the set of time slice will reduce the exposure time of web server to internet, restrict the intruders in a very short time window to deface web contents, and quickly recover defaced contents to avoid greater loss.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

POYU, WANG, e 王伯宇. "The Creation and Research of “Defacement” on Interactive Media Art". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/27846956861218353147.

Texto completo da fonte
Resumo:
碩士
國立臺灣藝術大學
多媒體動畫藝術學系
95
Technology brings convenience and plenty of possibilities to life. In the meantime, modern media provides arts with new materials and chances of combination among different fields. On the other hand, the development of technology gives the issue of over-urbanization. Over-urbanization makes people rush their everyday life. Therefore, it is getting more and more difficult for people to spend enough time to get below the surface of everything’s value; such as the shape of commodities, people’s dressing, package of products and so forth. It eventually forms contemporary social sense of value. The work of “Defacement” emerged from my own perception. It combines videos, interactive installations, sounds, instant transportation, and finally displays by interactive installations. This paper contains five sections of Introduction, literature review, methodology, conception and conclusions. Based on the media used and conception of creation, the literature begins with “what is new media art?” Then it leads into discussion and research of the development, attributes, concept of new media art, and the characteristic, application, connection of media. It also analyzes the topic about bodies, deconstruction, nihility and reality in new media art. Finally, it engages the results of discussion, research and analysis with the conception of creation step by step. The main conception of “Defacement” is the reconstruction of the monitored environment in today’s life. The audiences touch the sensor unconsciously. Scanners capture their appearances and actions. Then it deconstructs and re-combines the pictures with sounds and displays by interactive installations. During the audiences’ interaction with this work, they not only realize the creator’s perspective, but also find out that the appearance by sight gradually influences the tracks of life. This display of motive graphics shows the twist of people’s appearance because of contemporary social sense of value. It recalls people to deconstruct image and emphasize self consciousness.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Blas, Zachary Marshall. "Informatic Opacity: Biometric Facial Recognition and the Aesthetics and Politics of Defacement". Diss., 2014. http://hdl.handle.net/10161/9047.

Texto completo da fonte
Resumo:

Confronting the rapidly increasing, worldwide reliance on biometric technologies to surveil, manage, and police human beings, my dissertation Informatic Opacity: Biometric Facial Recognition and the Aesthetics and Politics of Defacement charts a series of queer, feminist, and anti-racist concepts and artworks that favor opacity as a means of political struggle against surveillance and capture technologies in the 21st century. Utilizing biometric facial recognition as a paradigmatic example, I argue that today's surveillance requires persons to be informatically visible in order to control them, and such visibility relies upon the production of technical standardizations of identification to operate globally, which most vehemently impact non- normative, minoritarian populations. Thus, as biometric technologies turn exposures of the face into sites of governance, activists and artists strive to make the face biometrically illegible and refuse the political recognition biometrics promises through acts of masking, escape, and imperceptibility. Although I specifically describe tactics of making the face unrecognizable as "defacement," I broadly theorize refusals to visually cohere to digital surveillance and capture technologies' gaze as "informatic opacity," an aesthetic-political theory and practice of anti- normativity at a global, technical scale whose goal is maintaining the autonomous determination of alterity and difference by evading the quantification, standardization, and regulation of identity imposed by biometrics and the state. My dissertation also features two artworks: Facial Weaponization Suite, a series of masks and public actions, and Face Cages, a critical, dystopic installation that investigates the abstract violence of biometric facial diagramming and analysis. I develop an interdisciplinary, practice-based method that pulls from contemporary art and aesthetic theory, media theory and surveillance studies, political and continental philosophy, queer and feminist theory, transgender studies, postcolonial theory, and critical race studies.


Dissertation
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Serfontein, Theodoris Erens. "Collection security in Natal libraries". Thesis, 1995. http://hdl.handle.net/10530/287.

Texto completo da fonte
Resumo:
Submitted in fulfilment of the requirements for the Degree of M.Bibl in the Faculty of Arts at the University of Zululand, 1995.
The purpose of this study was to determine if there was a collection security problem in South African libraries, with specific reference to Natal, to determine the extent of the problem, to find out why these problems exist, and to see if the countermeasures applied by the Natal libraries were effective-Data collection was done by means of a literature study, three empirical surveys, and a sample stocktaking exercise at the four libraries included in this project, to determine their loss rate. The results show that theft/loss and mutilation of library materials are problems of considerable magnitude, locally and internationally. (In 1991 it was estimated that in the United Kingdom library materials to the value of ± £100 million were lost) - The stocktake completed at three of the four Natal libraries included in this study , used the 3M electronic security system and the Durban Municipal Library the Checkpoint system. The main reasons for theft varied from, not having enough funds, and being selfish, to the book was not available in the bookshop and the user thought s/he would not get caught. The reasons for mutilation varied from, the user was not aware of the cost of replacing mutilated material, being selfish and to prevent others from getting the same information. It was also found that the photocopy services needed to be upgraded to prevent frustrated users from stealing or mutilating library materials, of the 343 respondents who participated in the survey conducted at the four libraries included in this study were inconvenienced by mutilation. The reasons for theft and mutilation by users in the Natal libraries coincided with those of the international world as found in the literature survey. Security or countermeasures are not effective and must be improved, i.e. the librarians must change their attitude towards library crimes, facilitate user access, implement a regular stocktaking programme, educate the library users, and publicise acts of theft and mutilation.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Defacement of"

1

Ostenrik, Teguh. Defacement: Teguh Ostenrik solo exhibition. Jakarta, Indonesia: Ide Global Art, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Taussig, Michael T. Defacement: Public secrecy and the labor of the negative. Stanford, Calif: Stanford University Press, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Demandt, Alexander. Vandalismus: Gewalt gegen Kultur. Berlin: Siedler, 1997.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Mekhitarian, Arpag. La misère des tombes thébaines. Bruxelles: Fondation égyptologique Reine Elisabeth, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Pin, Alʹbert. Mosty cherez veka. Moskva: Izd-vo "Znanie", 1985.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Louis, Réau. Histoire du vandalisme: Les monuments détruits de l'art français. Paris: R. Laffont, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kruszelnicki, Zygmunt. Toruń nie istniejący. Warszawa: Państwowe Wydawn. Nauk., 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Marija, Skirmantienė, e Varnauskas Jonas, eds. Nukentėję paminklai. Vilnius: Mokslo ir enciklopedijų Leidykla, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Hamel, Christopher De. Cutting up manuscripts for pleasure and profit. Charlottesville, Va: Book Arts Press, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

González, Antoni. Patrimoni : memòria o malson? =: Patrimonio : memoria o pesadilla? : memoria 1990-1992. Barcelona: Diputació de Barcelona, 1995.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Defacement of"

1

Reichert, Ramón. "III. Faciales Regime - Defacement". In Selfies - Selbstthematisierung in der digitalen Bildkultur, 117–78. Bielefeld, Germany: transcript Verlag, 2023. http://dx.doi.org/10.14361/9783839436653-003.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Barreira, Eva, Vasco Peixoto de Freitas e João M. P. Q. Delgado. "Biological Defacement of External Thermal Insulation Composite Systems". In Hygrothermal Behavior, Building Pathology and Durability, 23–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31158-1_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Orlemanski, Julie. "Desire and Defacement In The Testament of Cresseid". In Reading Skin in Medieval Literature and Culture, 161–81. New York: Palgrave Macmillan US, 2013. http://dx.doi.org/10.1057/9781137084644_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Hoang, Xuan Dau. "A Website Defacement Detection Method Based on Machine Learning". In Advances in Engineering Research and Application, 116–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04792-4_17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Reichert, Ramón. "Defacement – Faciales Regime, „Selfies“ und Gesichtsauflösung in Sozialen Medien". In De-Mediatisierung, 113–26. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-14666-5_6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Masango, Mfundo, Francois Mouton, Palesa Antony e Bokang Mangoale. "An Approach for Detecting Web Defacement with Self-healing Capabilities". In Transactions on Computational Science XXXII, 29–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-56672-5_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Viswanathan, N., e Arun Mishra. "Dynamic Monitoring of Website Content and Alerting Defacement Using Trusted Platform Module". In Emerging Research in Computing, Information, Communication and Applications, 117–26. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0287-8_11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Chiesa, Raoul, e Marco De Luca Saggese. "Data Breaches, Data Leaks, Web Defacements: Why Secure Coding Is Important". In Proceedings of 4th International Conference in Software Engineering for Defence Applications, 261–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27896-4_22.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Medvet, Eric, e Alberto Bartoli. "On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements". In Detection of Intrusions and Malware, and Vulnerability Assessment, 60–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73614-1_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

"HEGEL'S DEATH SPACE". In Defacement, 40–46. Stanford University Press, 1999. http://dx.doi.org/10.1515/9781503617131-006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Defacement of"

1

Bergadano, Francesco, Fabio Carretto, Fabio Cogno e Dario Ragno. "Defacement response via keyed learning". In 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA). IEEE, 2017. http://dx.doi.org/10.1109/iisa.2017.8316359.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Maggi, Federico, Marco Balduzzi, Ryan Flores, Lion Gu e Vincenzo Ciancaglini. "Investigating Web Defacement Campaigns at Large". In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3196494.3196542.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

K Das, Ashish, Quynh Thi Nguyen e Susan Thomas. "Entertaining Whilst Defacing Websites: Psychological Games for Hackers". In InSITE 2017: Informing Science + IT Education Conferences: Vietnam. Informing Science Institute, 2017. http://dx.doi.org/10.28945/3721.

Texto completo da fonte
Resumo:
Aim/Purpose: This study aims to investigate various characteristics from both victims as defaced websites and defacers that linked to a risk of being defaced through a set of descriptive analysis. Background: The current figures from a spectrum of sources, both academic and non-academic reports, proved a progressive increase of website defacement attacks to numerous organisations. Methodology: This study obtains a set of data from Zone-H site, which is accessible to the public, including 99,437 defaced websites. The descriptive analysis is applied in order to understand the motives of defacers and the probability of website re-defacements through the statistical investigation. Findings: The motives for defacing websites are driven mainly due to entertaining reasons. This in turn has an implication on the type of techniques defacers attack websites.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Masango, Mfundo, Francois Mouton, Palesa Antony e Bokang Mangoale. "Web Defacement and Intrusion Monitoring Tool: WDIMT". In 2017 International Conference on Cyberworlds (CW). IEEE, 2017. http://dx.doi.org/10.1109/cw.2017.55.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kusuma, Mandahadi, Dedy Hariyadi e Indah Daila Sari. "Applying Visualization and Analysis Data to Investigate Cyber Crimes (Case: Web Defacement)". In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-9jbcba.

Texto completo da fonte
Resumo:
Even now, many website owners still find cyberattacks—typically web defacement—terrifying. The Indonesian police's Criminal Investigation Unit is still working to track down and apprehend web hackers and vandals because such activity violates the law, could negatively impact an institution's day-to-day operations, necessitates additional funding for repairs, and carries the risk of database theft. In order to map the social network of the cybercrime suspect, this study used VOSviewer as a tool and Zone-H.org as a data source. Both of these sources can be accessible by the general public and used as Open Source Intelligence (OSINT) data. We were able to map one of the suspects who was apprehended by law enforcement, who goes by the pseudonym xgxs and goes by the username 13chmod37. This allowed us to give a general picture of the parties who might have been participating in the web defacement activity. The information we gave may be used by law enforcement to conduct additional investigations and track down additional offenders who are responsible for cyber attacks, particularly site defacement activity.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Hoang, Xuan Dau, e Ngoc Tuong Nguyen. "A Multi-layer Model for Website Defacement Detection". In the Tenth International Symposium. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3368926.3369730.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Mao, Barerem-Melgueba, e Kanlanfei Damnam Bagolibe. "A Contribution to Detect and Prevent a Website Defacement". In 2019 International Conference on Cyberworlds (CW). IEEE, 2019. http://dx.doi.org/10.1109/cw.2019.00062.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Hoang, Xuan Dau. "A Website Defacement Detection Method Based on Machine Learning Techniques". In the Ninth International Symposium. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3287921.3287975.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kumar, Atul, e Ishu Sharma. "Performance Evaluation of Machine Learning Algorithms for Website Defacement Attack Detection". In 2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES). IEEE, 2023. http://dx.doi.org/10.1109/icsses58299.2023.10201194.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Ayunda, Shakira Putri, Nurul Qomariasih, Raden Budiarto Hadiprakoso e Herman Kabetta. "Comparative Analysis of Deep Learning Models for Web Defacement Detection Based on Textual Context". In 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs). IEEE, 2023. http://dx.doi.org/10.1109/icocics58778.2023.10276697.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia