Crypto-ransomware: A revision of the state of the art, advances and challenges
JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …
Hybrid cyber defense strategies using Honey-X: A survey
The development and adoption of network technologies reshape our daily life; however,
network-connected devices have become popular targets of cybercrimes. Honey-X-based …
network-connected devices have become popular targets of cybercrimes. Honey-X-based …
An analysis of conti ransomware leaked source codes
In recent years, there has been an increase in ransomware attacks worldwide. These attacks
aim to lock victims' machines or encrypt their files for ransom. These kinds of ransomware …
aim to lock victims' machines or encrypt their files for ransom. These kinds of ransomware …
A taxonomy for threat actors' delivery techniques
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …
techniques, which allows the detection of novel techniques and the identification of …
Cyber Kill Chain Analysis Using Artificial Intelligence
A Shehu, M Umar, A Aliyu - Asian Journal of Research in …, 2023 - asian.go4sending.com
Artificial Intelligence (AI) tools are promising multifaceted techniques for addressing the most
mundane tasks for greater efficiency and high productivity. Cyber security space is one of …
mundane tasks for greater efficiency and high productivity. Cyber security space is one of …
[HTML][HTML] Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Data breaches in the government sector are severe threats to cybersecurity and illegal acts
that flagrantly violate security and privacy laws. It undermines public trust in government …
that flagrantly violate security and privacy laws. It undermines public trust in government …
Técnicas Avanzadas de Ciberseguridad: Integración y Evolución de la Kill Chain en Diversos Escenarios
JD Bermudez, JJ Castro, DA Peralta… - arXiv preprint arXiv …, 2023 - arxiv.org
The document provides an in-depth analysis of the main attack chain models used in
cybersecurity, including the Lockheed Martin Cyber Kill Chain framework, the MITER …
cybersecurity, including the Lockheed Martin Cyber Kill Chain framework, the MITER …
Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational
data, systems, computers, and networks from unauthorized access. However, the incressing …
data, systems, computers, and networks from unauthorized access. However, the incressing …
An Empirical Study of Ransomware Vulnerabilities Descriptions
C Lanza, A Lahmadi, F Osmond - 10th International Conference on …, 2024 - inria.hal.science
Cyber threat awareness requires the building of an accurate knowledge and analysis of the
vulnerabilities used by the attackers and their respective attack toolkits. Ransomware are …
vulnerabilities used by the attackers and their respective attack toolkits. Ransomware are …
Innovating Threat Detection: Behavioral
PR Kashyap, PR Katti, BP Hrishikesh… - … Soft Computing and …, 2024 - books.google.com
In an era defined by the relentless evolution of cyber threats, the demand for precise and
resilient malware classification and identification has reached a paramount level …
resilient malware classification and identification has reached a paramount level …