Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Alexander Adamov"'
Autor:
Alexander Adamov, Anders Carlsson
Publikováno v:
EWDTS
In this paper, we are going to verify the possibility to create a ransomware simulation that will use an arbitrary combination of known tactics and techniques to bypass an anti-malware defense. To verify this hypothesis, we conducted an experiment in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::df2dbe3b44f7343572afa84a087e733e
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20811
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20811
Publikováno v:
EWDTS
This paper contains an analysis of the LockerGoga ransomware that was used in the range of targeted cyberattacks in the first half of 2019 against Norsk Hydra - a world top 5 aluminum manufacturer, as well as the US chemical enterprises Hexion, and M
Publikováno v:
Proceedings of the 5th International Conference on Social, Economic, and Academic Leadership (ICSEALV 2019).
Publikováno v:
Proceedings of the 2019 3rd International Conference on Education, Economics and Management Research (ICEEMR 2019).
Publikováno v:
Cyber Physical Computing for IoT-driven Services ISBN: 9783319548241
The architecture of a vector logical multiprocessor for parallel analysis of big data in cyberspace aimed at searching, pattern recognition, and decision making is proposed. Vector logical architectures for solving market-focused problems are investi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb2ea0a6edd246fc72aa6b1108a5e2b6
https://doi.org/10.1007/978-3-319-54825-8_2
https://doi.org/10.1007/978-3-319-54825-8_2
Autor:
Alexander Adamov, Anders Carlsson
Publikováno v:
EWDTS
This paper contains an analysis of the payload of the popular ransomware for Windows, Android, Linux, and MacOSX platforms. Namely, VaultCrypt (CrypVault), TeslaCrypt, NanoLocker, Trojan-Ransom.Linux.Cryptor, Android Simplelocker, OSX/KeRanger-A, Wan
Autor:
Anders Carlsson, Alexander Adamov
Publikováno v:
EWDTS
This paper addresses the problem of incident response in clouds. A conventional incident response model is formulated to be used as a basement for the cloud incident response model. Minimization of incident handling time is considered as a key criter
Autor:
Alexander Adamov, Anders Carlsson
Publikováno v:
EWDTS
This paper addresses the problem of protecting cloud environments against targeted attacks, which have become a popular mean of gaining access to organization's confidential information and resources of cloud providers. Only in 2015 eleven targeted a
Autor:
Kirill Sorudeykin, Alexander Adamov, Vladimir Hahanov, Eugenia Litvinova, Svetlana Chumachenko
Publikováno v:
The Experience of Designing and Application of CAD Systems in Microelectronics.
In this paper it is proposed an universal criterion and structures for evaluating the quality of object interaction in the deterministic cyberspace through the use of only the logical operations to determine the distances between the processes and ph
Publikováno v:
EWDTS
Botnets became the powerful cyber weapon that involves tens of millions of infected computers - “cyber zombies” - all over the world. The security industry makes efforts to prevent spreading botnets and compromising an Individual Cyberspace (IC)[