A principlist framework for cybersecurity ethics

P Formosa, M Wilson, D Richards - Computers & Security, 2021 - Elsevier
The ethical issues raised by cybersecurity practices and technologies are of critical
importance. However, there is disagreement about what is the best ethical framework for …

Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China

JC Park, JR Crandall - 2010 IEEE 30th International …, 2010 - ieeexplore.ieee.org
We present results from measurements of the filtering of HTTP HTML responses in China,
which is based on string matching and TCP reset injection by backbone-level routers. This …

[图书][B] Ethical hacking

A Maurushat - 2019 - library.oapen.org
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical
Hacking discusses the attendant moral and legal issues. The first part of the 21st century will …

[PDF][PDF] Attacking and defending with intelligent botnets

M Danziger, MAA Henriques - XXXV Simpósio Brasileiro de …, 2017 - biblioteca.sbrt.org.br
Machine learning (ML) has been seen as a great ally of security. All his potential to automate
actions with some level of intelligence has called the attention of industry which is using it on …

Active Cyber Defense by Benevolent Worms

MM Chowdhury, JM Del Toro… - … Conference on Electro …, 2022 - ieeexplore.ieee.org
Worms has been known for their negative stigma, in the realm of cyber security. To fight
against knives, we need at least knives. Similarity to counteract the worms, we can use …

The benevolent health worm: comparing Western human rights-based ethics and Confucian duty-based moral philosophy

A Maurushat - Ethics and information technology, 2008 - Springer
Censorship in the area of public health has become increasingly important in many parts of
the world for a number of reasons. Groups with vested interest in public health policy are …

Viral Behaviors: Viruses and Viral Phenomena across Science, Technology, and the Arts

R Buiani - 2024 - torrossa.com
It was June 2017. While I was visiting the fifty-seventh Biennale di Venezia, an installation at
the Danish Pavilion drew my attention. The installation was titled Influenza, Theatre of …

A distributed computation model for marketable quality and profitability considering unfair relationship

V Barolli, H Fukuda - 16th International Workshop on Database …, 2005 - ieeexplore.ieee.org
In this paper, we provide an evaluation method for both: the quality aspect of corporations
(marketable quality) and the profitability. We define the corporation rate of operation and …

The ethics of coexistence: Can I learn to stop worrying and love the logic bomb?

J Aycock, A Somayaji, J Sullins - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Computer security attacks are frequent fodder for ethical analyses, but the ethics of computer
security defenses are not often examined. We address this by considering a topical problem …

[PDF][PDF] Ethical principles shaping cybersecurity decision-making

J Fenech - 2021 - figshare.mq.edu.au
The human factor in information systems has been a large vulnerability when implementing
cybersecurity and many approaches, including technical and policy driven solutions, seek to …