{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T01:05:04Z","timestamp":1771635904887,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811027406","type":"print"},{"value":"9789811027413","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2741-3_5","type":"book-chapter","created":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T23:27:31Z","timestamp":1474846051000},"page":"54-65","source":"Crossref","is-referenced-by-count":23,"title":["Recent Cyber Security Attacks and Their Mitigation Approaches \u2013 An Overview"],"prefix":"10.1007","author":[{"given":"Abdullahi","family":"Chowdhury","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139540803","volume-title":"Principles of Cybercrime","author":"J Clough","year":"2015","unstructured":"Clough, J.: Principles of Cybercrime. Cambridge University Press, Cambridge (2015)"},{"key":"5_CR2","unstructured":"Passeri, P.: Cyber Attacks StatisticsPaolo Passeri, May 2016. http:\/\/www.hackmageddon.com\/category\/security\/cyber-attacks-statistics\/ . Accessed 07 October 2016"},{"key":"5_CR3","unstructured":"Aviram, N., et al.: DROWN: Breaking TLS using SSLv2 (2016). https:\/\/www.lemarson.com\/public\/upload\/ressource\/filename\/DROWN_SSL.pdf . Accessed 08 November 2016"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE (2013)","DOI":"10.1109\/SP.2013.42"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Leurent, G.: Transcript collision attacks: breaking authentication in TLS, IKE, and SSH. In: NDSS, February 2016","DOI":"10.14722\/ndss.2016.23418"},{"key":"5_CR6","unstructured":"Beattie, D.: The DROWN Attack Vulnerability and Changing Your Server Configuration (2016)"},{"key":"5_CR7","unstructured":"Dukhovni, V., K\u00e4sper, E.: An OpenSSL User\u2019s Guide to DROWN, OpenSSL, Editor (2016)"},{"key":"5_CR8","unstructured":"GitHub. Fast and full-featured SSL scanner (2016). https:\/\/github.com\/iSECPartners\/sslyze?_sm_byp=iVVWSrMVJZLN4jMF . Accessed 08 November 2016"},{"key":"5_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-319-33630-5_22","volume-title":"ICT Systems Security and Privacy Protection","author":"P Chen","year":"2016","unstructured":"Chen, P., Huygens, C., Desmet, L., Joosen, W.: Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IFIP AICT, vol. 471, pp. 323\u2013336. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-33630-5_22"},{"key":"5_CR10","unstructured":"OWASP. Category: OWASP Top Ten Project (2016). https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013 . Accessed 07 October 2016"},{"key":"5_CR11","unstructured":"Sharma, P., Singh, A.: A review on detection and prevention techniques of denial of service attack in vanet. Int. J. Adv. Res. Comput. Sci. 6(5) (2015)"},{"key":"5_CR12","unstructured":"Keane, J.: DDoS attacks hit record numbers in Q2 2015 (2015). http:\/\/www.digitaltrends.com\/computing\/ddos-attacks-hit-record-numbers-in-q2-2015\/ . Accessed 07 October 2016"},{"key":"5_CR13","unstructured":"Networks, A. DDoS attacks: Understanding the Threat (2013). http:\/\/www.slideshare.net\/Arbor_Networks\/ddos-attacks-understanding-the-threat . Accessed 07 October 2016"},{"key":"5_CR14","unstructured":"Lab, K. Kaspersky DDoS Intelligence Report for Q1 2016 (2016). https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/74550\/kaspersky-ddos-intelligence-report-for-q1-2016\/ . Accessed 07 October 2016"},{"key":"5_CR15","unstructured":"Karp, P.: Census website back online after day of recriminations over 43-hour outage. The Guardian, Australia (2016)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Bond, M., et al.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy. IEEE (2014)","DOI":"10.1109\/SP.2014.11"},{"key":"5_CR17","unstructured":"CSC. Breaking down the threat of cyber terrorism (2016). http:\/\/blogs.csc.com\/2016\/02\/04\/breaking-down-the-threat-of-cyber-terrorism\/ . Accessed 08 November 2016"},{"key":"5_CR18","unstructured":"Zolkipli, M.F., Jantan, A.: An approach for malware behavior identification and classification. In: 2011 3rd International Conference on Computer Research and Development (ICCRD). IEEE (2011)"},{"key":"5_CR19","unstructured":"Goodin, D.: Massive US-planned cyberattack against Iran went well beyond Stuxnet (2016). http:\/\/arstechnica.com\/tech-policy\/2016\/02\/massive-us-planned-cyberattack-against-iran-went-well-beyond-stuxnet\/ . Accessed 08 November 2016"},{"key":"5_CR20","unstructured":"Talbot, D.: Cyber-Espionage Nightmare (2015). https:\/\/www.technologyreview.com\/s\/538201\/cyber-espionage-nightmare . Accessed 08 November 2016"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Ajayi, E.F.G.: The Impact of Cyber Crimes on Global Trade and Commerce. Available at SSRN (2016)","DOI":"10.2139\/ssrn.2810782"},{"key":"5_CR22","unstructured":"Milian, M.: Top Ten Hacking Countries (2016). http:\/\/www.bloomberg.com\/slideshow\/2013-04-23\/top-ten-hacking-countries.html . Accessed 07 October 2016"},{"key":"5_CR23","unstructured":"S, V. How to block DROWN attack \u2013 Fix SSL vulnerability in Linux, Apache, Nginx, Exim and other servers (2016). https:\/\/bobcares.com\/blog\/how-to-fix-drown-attack-ssl-vulnerability\/ . Accessed 08 November 2016"},{"key":"5_CR24","first-page":"345","volume":"19","author":"K Shields","year":"2015","unstructured":"Shields, K.: Cybersecurity: recognizing the risk and protecting against attacks. NC Bank. Inst. 19, 345 (2015)","journal-title":"NC Bank. Inst."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Donaldson, S.E., et al.: Measuring a Cybersecurity Program. In: Enterprise Cybersecurity, pp. 213\u2013229. Springer (2015)","DOI":"10.1007\/978-1-4302-6083-7_12"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Cavelty, M.D., Mauer, V.: Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Routledge, London (2016)","DOI":"10.4324\/9781315601793"},{"key":"5_CR27","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang, D., et al.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162\u2013178 (2015)","journal-title":"Inf. Sci."},{"issue":"3","key":"5_CR28","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8(3), 1086\u20131090 (2009)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"11","key":"5_CR29","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2741-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:27:57Z","timestamp":1568406477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2741-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027406","9789811027413"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2741-3_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}