Stock Exchange Threat Modeling, EGX as a Case Study View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018

AUTHORS

Ehab ElShafei , Nashwa AbdelBaki

ABSTRACT

Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement. More... »

PAGES

203-212

References to SciGraph publications

Book

TITLE

Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017

ISBN

978-3-319-64860-6
978-3-319-64861-3

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19

DOI

http://dx.doi.org/10.1007/978-3-319-64861-3_19

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1091392918


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nile University", 
          "id": "https://www.grid.ac/institutes/grid.440877.8", 
          "name": [
            "Nile University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "ElShafei", 
        "givenName": "Ehab", 
        "id": "sg:person.0745032215.16", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0745032215.16"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Nile University", 
          "id": "https://www.grid.ac/institutes/grid.440877.8", 
          "name": [
            "Nile University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "AbdelBaki", 
        "givenName": "Nashwa", 
        "id": "sg:person.010062432325.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/1124772.1124861", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003721226"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2508859.2516694", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026535238"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-11122-3_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026566090", 
          "https://doi.org/10.1007/978-3-319-11122-3_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.jeconbus.2014.03.002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026621435"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mic.2014.86", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061404320"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.2139/ssrn.2912908", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1090424726"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iscc.2015.7405513", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094931914"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018", 
    "datePublishedReg": "2018-01-01", 
    "description": "Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement.", 
    "editor": [
      {
        "familyName": "Hassanien", 
        "givenName": "Aboul Ella", 
        "type": "Person"
      }, 
      {
        "familyName": "Shaalan", 
        "givenName": "Khaled", 
        "type": "Person"
      }, 
      {
        "familyName": "Gaber", 
        "givenName": "Tarek", 
        "type": "Person"
      }, 
      {
        "familyName": "Tolba", 
        "givenName": "Mohamed F.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-64861-3_19", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-64860-6", 
        "978-3-319-64861-3"
      ], 
      "name": "Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017", 
      "type": "Book"
    }, 
    "name": "Stock Exchange Threat Modeling, EGX as a Case Study", 
    "pagination": "203-212", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-64861-3_19"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "eddf3ef1c71c3a5205370dcfd58813c0c87e9ba2a5824b7e996d08cc9c5455c5"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1091392918"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-64861-3_19", 
      "https://app.dimensions.ai/details/publication/pub.1091392918"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T14:29", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8669_00000280.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-64861-3_19"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'


 

This table displays all metadata directly associated to this object as RDF triples.

109 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-64861-3_19 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N293dfd997894475199afa420006a513f
4 schema:citation sg:pub.10.1007/978-3-319-11122-3_14
5 https://doi.org/10.1016/j.jeconbus.2014.03.002
6 https://doi.org/10.1109/iscc.2015.7405513
7 https://doi.org/10.1109/mic.2014.86
8 https://doi.org/10.1145/1124772.1124861
9 https://doi.org/10.1145/2508859.2516694
10 https://doi.org/10.2139/ssrn.2912908
11 schema:datePublished 2018
12 schema:datePublishedReg 2018-01-01
13 schema:description Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement.
14 schema:editor Nf9111cb54b1f4e56827f87a0b6715616
15 schema:genre chapter
16 schema:inLanguage en
17 schema:isAccessibleForFree false
18 schema:isPartOf N2232da50697049c6b49cdcd8d36b50ce
19 schema:name Stock Exchange Threat Modeling, EGX as a Case Study
20 schema:pagination 203-212
21 schema:productId N17d0d4890caa43ab9c1c2f9354285c23
22 N1fda10fa1a984bf6a823ea3ec64c5f84
23 Nb05fba7427ec4672b35e4846dfed0766
24 schema:publisher N1f7eb21ff58742248e785e87a31e4a02
25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091392918
26 https://doi.org/10.1007/978-3-319-64861-3_19
27 schema:sdDatePublished 2019-04-15T14:29
28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
29 schema:sdPublisher N8526ac53a5b04d77a17ce63551cea614
30 schema:url http://link.springer.com/10.1007/978-3-319-64861-3_19
31 sgo:license sg:explorer/license/
32 sgo:sdDataset chapters
33 rdf:type schema:Chapter
34 N17d0d4890caa43ab9c1c2f9354285c23 schema:name doi
35 schema:value 10.1007/978-3-319-64861-3_19
36 rdf:type schema:PropertyValue
37 N1f7eb21ff58742248e785e87a31e4a02 schema:location Cham
38 schema:name Springer International Publishing
39 rdf:type schema:Organisation
40 N1fda10fa1a984bf6a823ea3ec64c5f84 schema:name readcube_id
41 schema:value eddf3ef1c71c3a5205370dcfd58813c0c87e9ba2a5824b7e996d08cc9c5455c5
42 rdf:type schema:PropertyValue
43 N2232da50697049c6b49cdcd8d36b50ce schema:isbn 978-3-319-64860-6
44 978-3-319-64861-3
45 schema:name Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017
46 rdf:type schema:Book
47 N2467b82ab0934bda90e3f02fc3371235 rdf:first N3b8feee7b95b434c8d3e79b35eb39005
48 rdf:rest N88480152e4a24f30840e727fb89c7d8f
49 N293dfd997894475199afa420006a513f rdf:first sg:person.0745032215.16
50 rdf:rest Ne0d40a1d1a704d2380186307b234b179
51 N3b8feee7b95b434c8d3e79b35eb39005 schema:familyName Shaalan
52 schema:givenName Khaled
53 rdf:type schema:Person
54 N400c70adcfc64df18906aa50f48e4978 schema:familyName Tolba
55 schema:givenName Mohamed F.
56 rdf:type schema:Person
57 N45f51a50d9bd4660acd65644240a2f06 schema:familyName Gaber
58 schema:givenName Tarek
59 rdf:type schema:Person
60 N52f753d49ece4ad593d2ea80997be126 rdf:first N400c70adcfc64df18906aa50f48e4978
61 rdf:rest rdf:nil
62 N8526ac53a5b04d77a17ce63551cea614 schema:name Springer Nature - SN SciGraph project
63 rdf:type schema:Organization
64 N88480152e4a24f30840e727fb89c7d8f rdf:first N45f51a50d9bd4660acd65644240a2f06
65 rdf:rest N52f753d49ece4ad593d2ea80997be126
66 Nb05fba7427ec4672b35e4846dfed0766 schema:name dimensions_id
67 schema:value pub.1091392918
68 rdf:type schema:PropertyValue
69 Ndeb55887edf34428b63fe4ad8f6a7127 schema:familyName Hassanien
70 schema:givenName Aboul Ella
71 rdf:type schema:Person
72 Ne0d40a1d1a704d2380186307b234b179 rdf:first sg:person.010062432325.70
73 rdf:rest rdf:nil
74 Nf9111cb54b1f4e56827f87a0b6715616 rdf:first Ndeb55887edf34428b63fe4ad8f6a7127
75 rdf:rest N2467b82ab0934bda90e3f02fc3371235
76 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
77 schema:name Information and Computing Sciences
78 rdf:type schema:DefinedTerm
79 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
80 schema:name Data Format
81 rdf:type schema:DefinedTerm
82 sg:person.010062432325.70 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
83 schema:familyName AbdelBaki
84 schema:givenName Nashwa
85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70
86 rdf:type schema:Person
87 sg:person.0745032215.16 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
88 schema:familyName ElShafei
89 schema:givenName Ehab
90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0745032215.16
91 rdf:type schema:Person
92 sg:pub.10.1007/978-3-319-11122-3_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026566090
93 https://doi.org/10.1007/978-3-319-11122-3_14
94 rdf:type schema:CreativeWork
95 https://doi.org/10.1016/j.jeconbus.2014.03.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026621435
96 rdf:type schema:CreativeWork
97 https://doi.org/10.1109/iscc.2015.7405513 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094931914
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1109/mic.2014.86 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061404320
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1145/1124772.1124861 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003721226
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1145/2508859.2516694 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026535238
104 rdf:type schema:CreativeWork
105 https://doi.org/10.2139/ssrn.2912908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090424726
106 rdf:type schema:CreativeWork
107 https://www.grid.ac/institutes/grid.440877.8 schema:alternateName Nile University
108 schema:name Nile University
109 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...