Protected Computer

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 45 Experts worldwide ranked by ideXlab platform

Bala Srinivasan - One of the best experts on this subject based on the ideXlab platform.

  • a network defense system for detecting and preventing potential hacking attempts
    International Conference on Information Networking, 2016
    Co-Authors: Saad Alsunbul, Jefferson Tan, Bala Srinivasan
    Abstract:

    Many computing systems have recently suffered significantly from hacking, and preventing hacking is important in protecting business, sensitive information and every day network communications. Many efforts have been made to provide security assurance by proposing security solutions. However, the gap between hacking incidents and current security solutions is significant. Fortunately, hacking attempts can be addressed if the pre-hacking step, called scanning, is properly investigated and good counter measures are in place. The importance of scanning appears is in providing sophisticated hackers with the necessary information about nominated victims' systems which eventually forms their hacking strategies. Therefore, this article proposes a security solution that aims to make scanning difficult by addressing its properties, which makes developing appropriate hacking strategies against Protected Computer networks unpractical. The proposed security solution protects Computer networks by dynamically generating a unique protocol to replace the expected standard protocols and changing network paths periodically in order to confuse scanning attempts, as well as prevent unauthorized scanning and hacking traffic.

  • ICOIN - A network defense system for detecting and preventing potential hacking attempts
    2016 International Conference on Information Networking (ICOIN), 2016
    Co-Authors: Saad Alsunbul, Jefferson Tan, Bala Srinivasan
    Abstract:

    Many computing systems have recently suffered significantly from hacking, and preventing hacking is important in protecting business, sensitive information and every day network communications. Many efforts have been made to provide security assurance by proposing security solutions. However, the gap between hacking incidents and current security solutions is significant. Fortunately, hacking attempts can be addressed if the pre-hacking step, called scanning, is properly investigated and good counter measures are in place. The importance of scanning appears is in providing sophisticated hackers with the necessary information about nominated victims' systems which eventually forms their hacking strategies. Therefore, this article proposes a security solution that aims to make scanning difficult by addressing its properties, which makes developing appropriate hacking strategies against Protected Computer networks unpractical. The proposed security solution protects Computer networks by dynamically generating a unique protocol to replace the expected standard protocols and changing network paths periodically in order to confuse scanning attempts, as well as prevent unauthorized scanning and hacking traffic.

Patrick K. Bobko - One of the best experts on this subject based on the ideXlab platform.

  • Open-Source Software and the Demise of Copyright
    Rutgers Computer and Technology Law Journal, 2001
    Co-Authors: Patrick K. Bobko
    Abstract:

    I. COPYRIGHT, SOFTWARE, AND THE CURRENT DEBATE A. Introduction The scope of copyright protection for Computer software reflects a variety of economic considerations. The chief goal of copyright law is to provide an economic incentive for creative efforts.(1) The principal tool by which copyright promotes authors' creative efforts is the grant of exclusive rights to their works for a limited period of time.(2) Due in part to the competition in the software market, the complexity of Computer software, and the law's ill preparedness to deal with the preceding two factors, "the state of copyright law with respect to Computer software has been in flux since the early 1980's and is still not settled."(3) In particular, the law has yet to accurately identify the non-literal aspects of copyright-Protected Computer programs, and that failure has precipitated a spirited debate.(4) Participants in the debate can generally be classified according to the scope of protection they believe copyright affords a Computer program's non-literal elements.(5) Both academics and industry participants have noted the importance of the debate over the scope of copyright protection for software; in fact, some commentators have stated that its outcome would determine the future of the international software industry.(6) With the emergence of open-source software ("OSS"), some of the debate over copyright protection has taken a new focus. Although OSS depends upon copyright protection for its continued existence, the economic incentives of OSS are not the traditional economic incentives assumed by copyright law because they do not arise out of a monopoly of the copyrighted material. As a result, copyright law plays a diminished role in OSS.(7) Part I of this article examines the economic foundation of the commercial software industry and its reliance upon copyright law, highlighting the current debate concerning the appropriate level of software protection for a program's non-literal elements. Part II examines OSS and its impact on the information industries with particular emphasis on its freedom from market pressures and technical superiority over its proprietary counterparts. This article concludes that although some copyright protection is required to perpetuate the open-source movement, OSS' emergence has substantially mooted the current debate over the appropriate level of protection for a program's non-literal elements. B. Introduction to Copyright Law The Copyright Act(8) protects all "original works of authorship [when they are] fixed in any tangible medium of expression."(9) Copyright protection provides an author limited, exclusive rights over his work,(10) and confers on him certain enumerated privileges(11) that extend to a work's literal and "non-literal" aspects.(12) The "non-literal" aspects of copyrighted works that have been afforded protection are "the plot outline of a movie, the structure, sequence and organization of a Computer program, or even the `total concept and feel' of a song, a television show, or a greeting card."(13) A copyright owner has the ability to reap commercial rewards for his work.(14) The owner's exclusive right to his work includes the ability to prevent the making of derivative works.(15) A copyright owner can sue the maker of an unauthorized derivative work for infringement of the original.(16) "[I]n order to qualify for a separate copyright as a derivative work ... the additional matter injected in a prior work ... must constitute more than a minimal contribution."(17) Generally, the contribution to the existing, copyrighted work must render the derivative work distinguishable in a meaningful manner to avoid infringement.(18) Copyright does not protect ideas, but only the author's original expression of those ideas.(19) For example, in the seminal case of Baker v. Selden,(20) the Supreme Court denied the author of a copyrighted book exclusive rights to the system of bookkeeping that his text explained. …

Saad Alsunbul - One of the best experts on this subject based on the ideXlab platform.

  • a network defense system for detecting and preventing potential hacking attempts
    International Conference on Information Networking, 2016
    Co-Authors: Saad Alsunbul, Jefferson Tan, Bala Srinivasan
    Abstract:

    Many computing systems have recently suffered significantly from hacking, and preventing hacking is important in protecting business, sensitive information and every day network communications. Many efforts have been made to provide security assurance by proposing security solutions. However, the gap between hacking incidents and current security solutions is significant. Fortunately, hacking attempts can be addressed if the pre-hacking step, called scanning, is properly investigated and good counter measures are in place. The importance of scanning appears is in providing sophisticated hackers with the necessary information about nominated victims' systems which eventually forms their hacking strategies. Therefore, this article proposes a security solution that aims to make scanning difficult by addressing its properties, which makes developing appropriate hacking strategies against Protected Computer networks unpractical. The proposed security solution protects Computer networks by dynamically generating a unique protocol to replace the expected standard protocols and changing network paths periodically in order to confuse scanning attempts, as well as prevent unauthorized scanning and hacking traffic.

  • ICOIN - A network defense system for detecting and preventing potential hacking attempts
    2016 International Conference on Information Networking (ICOIN), 2016
    Co-Authors: Saad Alsunbul, Jefferson Tan, Bala Srinivasan
    Abstract:

    Many computing systems have recently suffered significantly from hacking, and preventing hacking is important in protecting business, sensitive information and every day network communications. Many efforts have been made to provide security assurance by proposing security solutions. However, the gap between hacking incidents and current security solutions is significant. Fortunately, hacking attempts can be addressed if the pre-hacking step, called scanning, is properly investigated and good counter measures are in place. The importance of scanning appears is in providing sophisticated hackers with the necessary information about nominated victims' systems which eventually forms their hacking strategies. Therefore, this article proposes a security solution that aims to make scanning difficult by addressing its properties, which makes developing appropriate hacking strategies against Protected Computer networks unpractical. The proposed security solution protects Computer networks by dynamically generating a unique protocol to replace the expected standard protocols and changing network paths periodically in order to confuse scanning attempts, as well as prevent unauthorized scanning and hacking traffic.

Jefferson Tan - One of the best experts on this subject based on the ideXlab platform.

  • a network defense system for detecting and preventing potential hacking attempts
    International Conference on Information Networking, 2016
    Co-Authors: Saad Alsunbul, Jefferson Tan, Bala Srinivasan
    Abstract:

    Many computing systems have recently suffered significantly from hacking, and preventing hacking is important in protecting business, sensitive information and every day network communications. Many efforts have been made to provide security assurance by proposing security solutions. However, the gap between hacking incidents and current security solutions is significant. Fortunately, hacking attempts can be addressed if the pre-hacking step, called scanning, is properly investigated and good counter measures are in place. The importance of scanning appears is in providing sophisticated hackers with the necessary information about nominated victims' systems which eventually forms their hacking strategies. Therefore, this article proposes a security solution that aims to make scanning difficult by addressing its properties, which makes developing appropriate hacking strategies against Protected Computer networks unpractical. The proposed security solution protects Computer networks by dynamically generating a unique protocol to replace the expected standard protocols and changing network paths periodically in order to confuse scanning attempts, as well as prevent unauthorized scanning and hacking traffic.

  • ICOIN - A network defense system for detecting and preventing potential hacking attempts
    2016 International Conference on Information Networking (ICOIN), 2016
    Co-Authors: Saad Alsunbul, Jefferson Tan, Bala Srinivasan
    Abstract:

    Many computing systems have recently suffered significantly from hacking, and preventing hacking is important in protecting business, sensitive information and every day network communications. Many efforts have been made to provide security assurance by proposing security solutions. However, the gap between hacking incidents and current security solutions is significant. Fortunately, hacking attempts can be addressed if the pre-hacking step, called scanning, is properly investigated and good counter measures are in place. The importance of scanning appears is in providing sophisticated hackers with the necessary information about nominated victims' systems which eventually forms their hacking strategies. Therefore, this article proposes a security solution that aims to make scanning difficult by addressing its properties, which makes developing appropriate hacking strategies against Protected Computer networks unpractical. The proposed security solution protects Computer networks by dynamically generating a unique protocol to replace the expected standard protocols and changing network paths periodically in order to confuse scanning attempts, as well as prevent unauthorized scanning and hacking traffic.

D F Mcgahn - One of the best experts on this subject based on the ideXlab platform.