Air gap (networking) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Air gap (networking)" in English language version.

refsWebsite
Global rank English rank
69th place
59th place
2nd place
2nd place
11th place
8th place
193rd place
152nd place
786th place
558th place
low place
low place
1st place
1st place
low place
low place
2,435th place
1,699th place
214th place
176th place
3rd place
3rd place
272nd place
225th place
1,185th place
840th place
3,696th place
2,428th place
1,216th place
797th place
5,990th place
3,752nd place
9th place
13th place
32nd place
21st place
20th place
30th place
1,521st place
944th place
low place
low place
9,033rd place
6,971st place
621st place
380th place
5th place
5th place

NFCdrip.com

acm.org

dl.acm.org

arxiv.org

  • Putz, Florentin; Álvarez, Flor; Classen, Jiska (2020-07-08). "Acoustic integrity codes". Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Linz Austria: ACM. pp. 31–41. arXiv:2005.08572. doi:10.1145/3395351.3399420. ISBN 978-1-4503-8006-5. S2CID 218673467.
  • Guri, Mordechai; Kedma, Gabi; Kachlon, Assaf; Elovici, Yuval (November 2014). "AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies". arXiv:1411.0237 [cs.CR].
  • Guri, Mordechai; Monitz, Matan; Mirski, Yisroel; Elovici, Yuval (April 2015). "BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations". arXiv:1503.07919 [cs.CR].

bbc.com

bgu.ac.il

cyber.bgu.ac.il

books.google.com

cnet.com

news.cnet.com

doi.org

ghostarchive.org

  • Guri, Mordechai; Kachlon, Assaf; Hasson, Ofer; Kedma, Gabi; Mirsky, Yisroel; Monitz, Matan; Elovici, Yuval (July 2015). "GSMem Breaking The Air-Gap". Cyber Security Labs @ Ben Gurion University. Archived from the original on 2021-12-19.

ietf.org

tools.ietf.org

  • Internet Security Glossary, Version 2. RFC 4949.

infoworld.com

  • Rist, Oliver (2006-05-29). "Hack Tales: Air-gap networking for the price of a pair of sneakers". Infoworld. IDG Network. Retrieved 2009-01-16. In high-security situations, various forms of data often must be kept off production networks, due to possible contamination from nonsecure resources — such as, say, the Internet. So IT admins must build enclosed systems to house that data — stand-alone servers, for example, or small networks of servers that aren't connected to anything but one another. There's nothing but air between these and other networks, hence the term air gap, and transferring data between them is done the old-fashioned way: moving disks back and forth by hand, via 'sneakernet'.

insurancenewsnet.com

  • "Weber vs SEC" (PDF). insurancenewsnet.com. 2012-11-15. p. 35. Archived from the original (PDF) on 2013-12-03. Retrieved 2012-12-06. Stock exchange internal network computer systems are so sensitive that they are "air gapped" and not attached to the internet, in order to protect them from attack, intrusion, or other malicious acts by third party adversaries.
  • "Weber vs SEC". Industrial internal network computer systems are so sensitive that they are "air gapped" and neither attached to the internet nor insecurely connects to the corporate network, in order to protect them from attack, intrusion, or other malicious acts by third party adversaries.

semanticscholar.org

api.semanticscholar.org

techradar.com

techtarget.com

whatis.techtarget.com

  • "What is air gapping (air gap attack)?". WhatIs.com. Retrieved 2020-12-16.

theregister.co.uk

uottawa.ca

ruor.uottawa.ca

usenix.org

blogs.usenix.org

web.archive.org

  • "Weber vs SEC" (PDF). insurancenewsnet.com. 2012-11-15. p. 35. Archived from the original (PDF) on 2013-12-03. Retrieved 2012-12-06. Stock exchange internal network computer systems are so sensitive that they are "air gapped" and not attached to the internet, in order to protect them from attack, intrusion, or other malicious acts by third party adversaries.
  • Zetter, Kim (2008-01-04). "FAA: Boeing's New 787 May Be Vulnerable to Hacker Attack". Wired Magazine. CondéNet, Inc. Archived from the original on 23 December 2008. Retrieved 2009-01-16. (...Boeing...) wouldn't go into detail about how (...it...) is tackling the issue but says it is employing a combination of solutions that involves some physical separation of the networks, known as air gaps, and software firewalls.

wired.com

worldcat.org

youtube.com

  • Guri, Mordechai; Kachlon, Assaf; Hasson, Ofer; Kedma, Gabi; Mirsky, Yisroel; Monitz, Matan; Elovici, Yuval (July 2015). "GSMem Breaking The Air-Gap". Cyber Security Labs @ Ben Gurion University. Archived from the original on 2021-12-19.

zdnet.com

zenodo.org