Tài liệu tham khảo |
Loại |
Chi tiết |
5. Hogan G. P., Svoboda M. and Webb C. E. (1999), The automation of the hook technique, Measurement Science and Technology |
Sách, tạp chí |
Tiêu đề: |
The automation of thehook technique |
Tác giả: |
Hogan G. P., Svoboda M. and Webb C. E |
Năm: |
1999 |
|
11. Pareek S., Gautam A. and Dey R. (2017), Different Type Network Security Threats and Solutions, A Review, IPASJ International Journal of Computer Science (IIJCS), volume 5, issue 4,pp. 1–10 |
Sách, tạp chí |
Tiêu đề: |
Different Type Network SecurityThreats and Solutions, A Review |
Tác giả: |
Pareek S., Gautam A. and Dey R |
Năm: |
2017 |
|
12. Pawar M. V. and Anuradha J. (2015), Network security and types of attacks in network, Procedia Computer Science, pp. 503–506 |
Sách, tạp chí |
Tiêu đề: |
Procedia Computer Science |
Tác giả: |
Pawar M. V. and Anuradha J |
Năm: |
2015 |
|
14. Sharp R. (2009), An Introduction to Malware Classification of Malware, Network |
Sách, tạp chí |
Tiêu đề: |
An Introduction to Malware Classification of Malware |
Tác giả: |
Sharp R |
Năm: |
2009 |
|
16. You I. and Yim K. (2010), Malware obfuscation techniques: A brief survey, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010.Trang Web |
Sách, tạp chí |
Tiêu đề: |
Proceedings - 2010 International Conference on Broadband, WirelessComputing Communication and Applications, BWCCA 2010 |
Tác giả: |
You I. and Yim K |
Năm: |
2010 |
|
17. [Online] Hook Functions - Windows applications | Microsoft Docs, https://docs.microsoft.com/en-us/windows/desktop/winmsg/hook-functions,truy cập ngày 18/06/2019 |
Sách, tạp chí |
Tiêu đề: |
https://docs.microsoft.com/en-us/windows/desktop/winmsg/hook-functions |
|
18. [Online] Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit, https://www.metasploit.com/, truy cập ngày 18/06/2019 |
Sách, tạp chí |
Tiêu đề: |
https://www.metasploit.com/ |
|
19. [Online] Virtual-Key Codes - Windows applications | Microsoft Docs, https://docs.microsoft.com/en-us/windows/desktop/inputdev/virtual-key-codes,truy cập ngày 19/06/2019 |
Sách, tạp chí |
Tiêu đề: |
https://docs.microsoft.com/en-us/windows/desktop/inputdev/virtual-key-codes |
|
1. Quốc hội nước CHXHCN Việt Nam Khóa XIV (2018), Luật An ninh mạng |
Khác |
|
3. Buchanan W.J. (2015), Windows Registry. Mastering Microsoft Windows, Novell NetWare and UNIX |
Khác |
|
4. Chien E. (2005), Techniques of adware and spyware, the Proceedings of the Fifteenth Virus |
Khác |
|
6. Gardner, Bill & Long, Johnny & Brown J. (2015), Google Hacking for Penetration Testers, Third Edition 3rd Edition |
Khác |
|
7. Gupta and Shiwani (2013), Malware and its types and protection from these malware |
Khác |
|
8. Middleton B. (2017), Kevin Mitnick, A History of Cyber Security Attacks |
Khác |
|
9. Mitrokotsa A. and Douligeris C (2007), Denial-of-Service Attacks, Network Security: Current Status and Future Directions |
Khác |
|
10. Microsoft (2017), MS17-010: Security update for Windows SMB Server |
Khác |
|
13. Pham D.V., Syed A. and Halgamuge M.N. (2011), Universal serial bus based software attacks and protection solutions, Digital Investigation |
Khác |
|
15. Type P.M., Length T.I. and Affected V.S. (2019), Trojan Vundo |
Khác |
|