NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 99
1.
  • A generic approach for netw... A generic approach for network defense strategies generation based on evolutionary game theory
    Liu, Liang; Tang, Chuhao; Zhang, Lei ... Information sciences, August 2024, 2024-08-00, Volume: 677
    Journal Article
    Peer reviewed

    The generation of optimal defense strategies in dynamic adversarial environments is crucial for cybersecurity. Recently, defense approaches based on evolutionary game theory have gained significant ...
Full text
2.
  • Detection of Current Attack... Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
    Mehmet Sabri Elmastaş Havacılık ve uzay teknolojileri dergisi (Online), 07/2023, Volume: 16, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of ...
Full text
3.
  • Reinforcing your SME agains... Reinforcing your SME against cyberthreats
    Paul, Sneha Computer fraud & security, 10/2017, Volume: 2017, Issue: 10
    Journal Article
    Peer reviewed

    Despite its name, the small and medium-sized enterprise (SME) sector is colossal in terms of size and revenue. Defined as a business having less than 500 employees and either an annual turnover under ...
Full text
4.
  • Implementation of Active Di... Implementation of Active Directory for efficient management of networks
    Iyer, Nalini C; Kabbur, Anil M.; Wali, Heera G. Procedia computer science, 2020, 2020-00-00, Volume: 172
    Journal Article
    Peer reviewed
    Open access

    Microsoft developed a hierarchical structure to provide a service related to storing information about objects through a comprehensive listing of objects on the network. Network administrators will ...
Full text

PDF
5.
  • Ransomware: Analysing the I... Ransomware: Analysing the Impact on Windows Active Directory Domain Services
    McDonald, Grant; Papadopoulos, Pavlos; Pitropakis, Nikolaos ... Sensors (Basel, Switzerland), 01/2022, Volume: 22, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime ...
Full text

PDF
6.
Full text
7.
  • Working Architecture of Active Directory Applications in Libraries
    Arumugam, J; Balasubramani, R Library philosophy and practice, 01/2019
    Journal Article
    Peer reviewed
    Open access

    Information Technology revolutionized era offer several tools for creating; organizing; storing and visualization of information in libraries in various perspectives. This paper highlights the ...
Full text
8.
  • Lessons learned from offlin... Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory
    Ebad, Shouki A. International journal of system assurance engineering and management, 02/2022, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed

    One of the famous directory services on the market is Active Directory (AD) by Microsoft. It consists of a set of services that work on Windows Server to manage access to networked resources. In this ...
Full text
9.
  • Threats Hidden in Office Ne... Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement
    Lee, Tung-Lin; Liu, I-Hsien; Li, Chu-Fen ... Journal of robotics, networking and artificial life, 2021/12, Volume: 8, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    With the advent of the Internet of Things (IoT) era, the concept of smart office has gradually come true. To facilitate the management, IoT devices often follow authentication mechanisms as windows ...
Full text

PDF
10.
Full text

PDF
1 2 3 4 5
hits: 99

Load filters