Zobrazeno 1 - 10
of 156
pro vyhledávání: '"Shukla, Sandeep Kumar"'
The current state of Advanced Persistent Threats (APT) attribution primarily relies on time-consuming manual processes. These include mapping incident artifacts onto threat attribution frameworks and employing expert reasoning to uncover the most lik
Externí odkaz:
http://arxiv.org/abs/2409.16400
Advanced Persistent Threat (APT) attribution is a critical challenge in cybersecurity and implies the process of accurately identifying the perpetrators behind sophisticated cyber attacks. It can significantly enhance defense mechanisms and inform st
Externí odkaz:
http://arxiv.org/abs/2409.11415
Publikováno v:
Digital Threats: Research and Practice (2024)
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis rep
Externí odkaz:
http://arxiv.org/abs/2403.03267
The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which are fraudul
Externí odkaz:
http://arxiv.org/abs/2304.07598
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to study different temporal and behavioral aspects of DNs involved in cryptoj
Externí odkaz:
http://arxiv.org/abs/2205.04685
Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatmen
Externí odkaz:
http://arxiv.org/abs/2204.04154
The temporal aspect of blockchain transactions enables us to study the address's behavior and detect if it is involved in any illicit activity. However, due to the concept of change addresses (used to thwart replay attacks), temporal aspects are not
Externí odkaz:
http://arxiv.org/abs/2112.11721
In cryptocurrency-based permissionless blockchain networks, the decentralized structure enables any user to join and operate across different regions. The criminal entities exploit it by using cryptocurrency transactions on the blockchain to facilita
Externí odkaz:
http://arxiv.org/abs/2112.11024
Autor:
Kirti, Sharma, Ajay Kumar, Yashavarddhan, M.H., Kumar, Rishav, Shaw, Priyanka, Kalonia, Aman, Shukla, Sandeep Kumar
Publikováno v:
In Tissue and Cell December 2024 91