-
181
-
182por Born, Michael“…The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.…”
Publicado 2019
Enlace del recurso
-
183Publicado 2020“…Meanwhile, new forms of ransomware have emerged, including malware originating from North Korea.…”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
184“…Firstly, we identify the URLs as either benign or malware using a binary classifier. Secondly, we classify the URL classes based on their feature into five classes: benign, spam, phishing, malware, and defacement. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
185por Bambenek, John“…This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it -- for everything from mail filtering and system log management to malware analysis. The book includes useful information not contained in the current grep documentation…”
Publicado 2009
Enlace del recurso
-
186“…Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
187por Liu, Xiang, Ahmad, Sayed Fayaz, Anser, Muhammad Khalid, Ke, Jingying, Irshad, Muhammad, Ul-Haq, Jabbar, Abbas, Shujaat“…Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, malware, and attacks on personal data. Firms worldwide spend a lot on addressing cybersecurity issues, which grow each year. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
188por Aponte-Novoa, Fredy Andrés, Povedano Álvarez, Daniel, Villanueva-Polanco, Ricardo, Sandoval Orozco, Ana Lucila, García Villalba, Luis Javier“…Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes the computational resources to extract cryptocurrencies in favor of the attacker. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
189por Sood, Aditya K, Talluri, Srilekha, Nagal, Amit, SL, Ruthvik Reddy, D, Bharathasimha Reddy, Chaturvedi, Rohit“…According to Forbes, Internet hits surged by 50-70%.(1) This phase shift caught the eye of adversaries, causing increased numbers of targeted and broad-based attacks such as phishing, malware distribution and online fear-mongering in order to conduct scams and fraudulent operations. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
190por Aurangzeb, Sana, Rais, Rao Naveed Bin, Aleem, Muhammad, Islam, Muhammad Arshad, Iqbal, Muhammad Azhar“…Ransomware is a more hazardous threat than other malware as the victim of ransomware cannot regain access to the hijacked device until some form of compensation is paid. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
191por Jakobsson, Markus“…Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. …”
Publicado 2012
Enlace del recurso
-
192“…Some VPNs will steal our bandwidth, infect our computers with malware, install secret tracking libraries on our devices, steal our personal data, and leave our data exposed to third parties. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
193por Ciholas, Pierre, Such, Jose Miguel, Marnerides, Angelos K., Green, Benjamin, Zhang, Jiajie, Roedig, Utz“…Our study shows that this flaw can be exploited by a method to (i) disable the anti-malware suite Symantec Endpoint Protection; (ii) overtake VirtualBox protected processes; (iii) circumvent two major video game anti-cheat protection solutions, BattlEye and EasyAntiCheat. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
194por Buschendorf, Fabiola“…In this way, security researchers and network admins gain information about the source of attacks, the techniques used by intruders and possibly gain access to unknown malware samples uploaded by the adversaries.…”
Publicado 2018
Enlace del recurso
-
195por Zonouz, Saman“…His previous works and research interests include PLC program analysis, security of embedded systems, and malware analysis and reverse engineering.</p> <p>Before the collaboration meeting, Dr. …”
Publicado 2017
Enlace del recurso
-
196por Raman, Raghu, Kumar Nair, Vinith, Nedungadi, Prema, Ray, Indrakshi, Achuthan, Krishnashree“…This study highlights the need for further research in bitcoin, blockchain, IoT, NLP, cryptocurrencies, phishing and cybercrime, botnets and malware, digital forensics, and electronic crime countermeasures about the Darkweb. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
197por Huancayo Ramos, Katherinne Shirley, Sotelo Monge, Marco Antonio, Maestre Vidal, Jorge“…The assumed evaluation methodology contemplates six phases that allow building a detection model against botnet-related malware distributed through the network, for which five supervised classifiers were instantiated were instantiated for further comparisons—Decision Tree, Random Forest, Naive Bayes Gaussian, Support Vector Machine and K-Neighbors. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
198por Xue, Nan, Luo, Xiong, Gao, Yang, Wang, Weiping, Wang, Long, Huang, Chao, Zhao, Wenbing“…In addition, the proposed algorithm is also successfully applied to the practical tasks of malware prediction in the field of malware analysis. …”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
199por Sanders, Chris, 1986-Tabla de Contenidos: “…Machine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .…”
Publicado 2014
Libro -
200por CERN. Geneva“…<br> <br>Beyond technical fixes to malware attacks, I will argue that there is an urgent need for organisations and nations to construct Total Information Awareness Systems and Knowledge Management Analysis Systems, to combat the rising tide of cybercrime and cyberterrorism. …”
Publicado 2006
Enlace del recurso