Cargando…

Disrupting drive-by download networks on Twitter

This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure use...

Descripción completa

Detalles Bibliográficos
Autores principales: Javed, Amir, Ikwu, Ruth, Burnap, Pete, Giommoni, Luca, Williams, Matthew L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Vienna 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9391206/
https://www.ncbi.nlm.nih.gov/pubmed/36035378
http://dx.doi.org/10.1007/s13278-022-00944-2

Ejemplares similares