Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Rahman, Md Rayhanur"'
Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring to the written artifacts on technical and forensic analysis of the techniques used by the malware in APT attacks. Objective: The goal of this research is
Externí odkaz:
http://arxiv.org/abs/2401.01865
Autor:
Rahman, Md Rayhanur, Wroblewski, Brandon, Matthews, Quinn, Morgan, Brantley, Menzies, Tim, Williams, Laurie
Defending from cyberattacks requires practitioners to operate on high-level adversary behavior. Cyberthreat intelligence (CTI) reports on past cyberattack incidents describe the chain of malicious actions with respect to time. To avoid repeating cybe
Externí odkaz:
http://arxiv.org/abs/2401.01883
Autor:
Rahman, Md Rayhanur, Williams, Laurie
Attackers utilize a plethora of adversarial techniques in cyberattacks to compromise the confidentiality, integrity, and availability of the target organizations and systems. Information security standards such as NIST, ISO/IEC specify hundreds of se
Externí odkaz:
http://arxiv.org/abs/2211.06500
Autor:
Rahman, Md Rayhanur, Williams, Laurie
Cyberattacks use adversarial techniques to bypass system defenses, persist, and eventually breach systems. The MITRE ATT\&CK framework catalogs a set of adversarial techniques and maps between adversaries and their used techniques and tactics. Unders
Externí odkaz:
http://arxiv.org/abs/2211.06495
Autor:
Rahman, Md Rayhanur, Williams, Laurie
The cyberthreat landscape is continuously evolving. Hence, continuous monitoring and sharing of threat intelligence have become a priority for organizations. Threat reports, published by cybersecurity vendors, contain detailed descriptions of attack
Externí odkaz:
http://arxiv.org/abs/2210.02601
Publikováno v:
ACM Comput. Surv. 55, 12, Article 241 (December 2023), 36 pages
Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles, where cyberattack strategies, procedures, and tools are described. The goal of this article is to aid cybe
Externí odkaz:
http://arxiv.org/abs/2109.06808
Publikováno v:
In Forest Policy and Economics June 2024 163
Autor:
Elder, Sarah1 (AUTHOR) seelder@ncsu.edu, Rahman, Md Rayhanur1 (AUTHOR) mrahman@ncsu.edu, Fringer, Gage1 (AUTHOR) gwfringe@alumni.ncsu.edu, Kapoor, Kunal1 (AUTHOR) kkapoor3@alumni.ncsu.edu, Williams, Laurie1 (AUTHOR) laurie_williams@ncsu.edu
Publikováno v:
ACM Computing Surveys. Aug2024, Vol. 56 Issue 8, p1-41. 41p.
Autor:
Haque, Anisul, Shampa, Akter, Marin, Hussain, Md. Manjurul, Rahman, Md. Rayhanur, Salehin, Mashfiqus, Rahman, Munsur
Publikováno v:
In Progress in Disaster Science January 2024 21
Context: Security smells are recurring coding patterns that are indicative of security weakness, and require further inspection. As infrastructure as code (IaC) scripts, such as Ansible and Chef scripts, are used to provision cloud-based servers and
Externí odkaz:
http://arxiv.org/abs/1907.07159