dc.contributor.author | Gul, Murat | |
dc.contributor.author | Aydin, Muhammed Ali | |
dc.date.accessioned | 2021-03-03T18:54:15Z | |
dc.date.available | 2021-03-03T18:54:15Z | |
dc.identifier.citation | Gul M., Aydin M. A. , "Exploits in Information Security", 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Türkiye, 16 - 19 Mayıs 2016, ss.1729-1732 | |
dc.identifier.other | vv_1032021 | |
dc.identifier.other | av_519eeca4-431e-4738-aab8-2b4107814f67 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12627/58012 | |
dc.identifier.uri | https://doi.org/10.1109/siu.2016.7496093 | |
dc.description.abstract | Almost the whole information that belongs to Goverment or private sector, Corporate or individual has been digitized currently. The computers which keep digitized information provides to use those information properly via applications such as database and web services. If necessary precautions hadn't been taken at individual or corporate level in both configuring network and applications, 'your information is not your own any more' can be said. In order to take necessary precautions, it will provide a great advantage to know the types of attacks and exploits and how they are made. In this perspective this paper is a survey about current attacks and exploits in which the types and how they exploit is explained with some basic examples. | |
dc.language.iso | eng | |
dc.subject | Sinyal İşleme | |
dc.subject | Mühendislik ve Teknoloji | |
dc.subject | Bilgi Sistemleri, Haberleşme ve Kontrol Mühendisliği | |
dc.subject | Mühendislik, Bilişim ve Teknoloji (ENG) | |
dc.subject | Mühendislik | |
dc.subject | MÜHENDİSLİK, ELEKTRİK VE ELEKTRONİK | |
dc.title | Exploits in Information Security | |
dc.type | Bildiri | |
dc.contributor.department | Havaci & Uzay Teknol Enstitusu , , | |
dc.contributor.firstauthorID | 148337 | |