Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Cheryl V. Hinds"'
Publikováno v:
2019 International Conference on Computational Science and Computational Intelligence (CSCI).
Online advertising is a cornerstone of the internet in today's digital age. Malicious Advertising, colloquially known as malvertising, uses advertisements as an attack vector to spread malicious software to unsuspecting victims. As a solution, this r
Publikováno v:
2017 International Conference on Computational Science and Computational Intelligence (CSCI).
A Remote Access Trojan (RAT) is a form of malware which once installed on the victim's machine, passes command and control (C2) back to the attacker. RATs can be used to steal sensitive information, spy on victims, and remotely control infected hosts
Autor:
Cheryl V. Hinds, Sandra J. DeLoatch, Jonathan M. Graham, Aurelia T. Williams, Aftab Ahmad, Curtis Steward, Luay A. Wahsheh
Publikováno v:
ITNG
As users of many different types of software, one of the last things we think about when deciding which is best for the task at hand is the security of the software. This of course depends on the type of software as well. If it is banking or tax soft
Autor:
Cheryl V. Hinds, Chinedu Ekwueme
Publikováno v:
ACM Southeast Regional Conference
To gain access to computer systems, users are required to be authenticated. This is usually accomplished by having the user enter an alphanumeric username and password. Users are usually required to remember multiple passwords for different systems a
Autor:
Cheryl V. Hinds, Jonathan M. Graham
Publikováno v:
ACM Southeast Regional Conference