A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

A host intrusion detection system architecture for embedded industrial devices

CV Martinez, B Vogel-Heuser - journal of the Franklin Institute, 2021 - Elsevier
Abstract The integration of Cyber-Physical Systems in the industrial domain has become
indispensable for Industry 4.0. Unfortunately, as the interconnectivity among them increases …

Investigating the Effectiveness of Hash Line Baseline for File Integrity Monitoring

A Jukuntla, G Gutha, A Palem… - … on Image Processing …, 2024 - ieeexplore.ieee.org
This study outlines the value of file integrity and the effective role hashing plays in
maintaining it. The goal of the study is to assess how well these techniques make use of …

[PDF][PDF] Comparing two cryptographic hash algorithms: SHA-512 and whirlpool-a case study on file integrity monitoring

F Al-Shareefi, Z Al-Barmani - BIO Web of Conferences, 2024 - bio-conferences.org
SHA-512 and Whirlpool are two distinct hashing algorithms in the cryptography domain.
Although they are different, these methods share some characteristics; such as both of them …

Επισκόπηση μεθόδων προστασίας από επιθέσεις κοινωνικής μηχανικής

Κ Κοντογεωργόπουλος - 2023 - hellanicus.lib.aegean.gr
Τα τελευταία χρόνια με την ολοένα και περισσότερο έντονη χρήση κοινωνικών δικτύων και
υπολογιστών καθώς και την εργασία εξ αποστάσεως ειδικά σε περιόδους καραντίνας λόγω …

[PDF][PDF] Automatic security hardening and protection of linux containers

M Mattetti, A Shulman-Peleg, Y Allouche… - Workshop on Security …, 2015 - researchgate.net
One of the central building blocks of cloud and big data platforms today are linux containers
which became popular due to their ability to simplify the deployment and management of …

[PDF][PDF] Improved Certificate Creation and Verification Architecture Using Hybrid Blockchain

MA Azim, MJB Zahir - … Journal of New Computer Architectures and …, 2020 - researchgate.net
Certificates containing proof of certain aspects of an entity are mostly given as printed
papers by government institutes and their supporting organizations in some countries. The …

Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks

RJ Heartfield - 2017 - gala.gre.ac.uk
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

[PDF][PDF] Identification of File Integrity Requirement through Severity Analysis

ZH Abdullaha, S Ismaila, NI Udzirb - fstm.kuis.edu.my
File integrity monitoring (FIM) tool is used to mitigate integrity violation risk in an operating
system and storage environment. The main challenge is to ensure the modification of related …

[引用][C] Self-Healing Intrusion Detection in Networks Using Blockchain

A Salman - 2018 - MCS