Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Macfarlane, Richard"'
Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la
Externí odkaz:
http://arxiv.org/abs/2305.18852
Publikováno v:
Entropy. 2022; 24(10):1503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many c
Externí odkaz:
http://arxiv.org/abs/2210.13376
Publikováno v:
Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817
It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other resear
Externí odkaz:
http://arxiv.org/abs/2201.08154
Publikováno v:
Computers & Security, 102377, 2021
The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attack. In the majority of cases, once a victim has been attacked there remain o
Externí odkaz:
http://arxiv.org/abs/2106.14418
Publikováno v:
Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979
Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were
Externí odkaz:
http://arxiv.org/abs/2012.08487
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature- and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deploy
Externí odkaz:
http://arxiv.org/abs/2006.01849
Publikováno v:
Journal of Network Technology, 2019
Bluetooth is a short-range wireless technology that provides audio and data links between personal smartphones and playback devices, such as speakers, headsets and car entertainment systems. Since its introduction in 2001, security researchers have s
Externí odkaz:
http://arxiv.org/abs/2002.05126
Publikováno v:
In Forensic Science International: Digital Investigation September 2023 46
Publikováno v:
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy
Externí odkaz:
http://arxiv.org/abs/1907.10387
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.