Virtuous human hacking: The ethics of social engineering in penetration-testing
JM Hatfield - Computers & Security, 2019 - Elsevier
This paper offers a virtue ethics analysis of social engineering in penetration-testing. It
begins by considering previous research on this topic and argues that such attempts …
begins by considering previous research on this topic and argues that such attempts …
Evaluating advanced persistent threats mitigation effects: a review
Advanced Persistent Threat APT is a targeted attack method used by a sophisticated,
determined and skilled adversary to maintain undetected access over an extended period …
determined and skilled adversary to maintain undetected access over an extended period …
Feature analysis for data-driven APT-related malware discrimination
LFM Liras, AR de Soto, MA Prada - Computers & Security, 2021 - Elsevier
Abstract Advanced Persistent Threats (APTs) have become a major concern for IT security
professionals around the world. These attacks are characterized by the use of both highly …
professionals around the world. These attacks are characterized by the use of both highly …
Advanced persistent threat: New analysis driven by life cycle phases and their challenges
BID Messaoud, K Guennoun, M Wahbi… - 2016 International …, 2016 - ieeexplore.ieee.org
In a world where highly skilled actors involved in cyber-attacks are constantly increasing and
where the associated underground market continues to expand, organizations should adapt …
where the associated underground market continues to expand, organizations should adapt …
Hybrid analysis technique to detect advanced persistent threats
SS Chakkaravarthy, V Vaidehi… - International Journal of …, 2018 - igi-global.com
Advanced persistent threats (APT) are major threats in the field of system and network
security. They are extremely stealthy and use advanced evasion techniques like packing …
security. They are extremely stealthy and use advanced evasion techniques like packing …
[PDF][PDF] Global Journal of Engineering and Technology Advances
OJ Chizoba, BA Kyari - Glob. J. Eng. Technol. Adv, 2020 - academia.edu
The demand for application of technology in almost all walks of life is in the increase and
can be seen to be geared by the paradigm changes in industrial revolutions (current 4.0) …
can be seen to be geared by the paradigm changes in industrial revolutions (current 4.0) …
Improved detection for advanced polymorphic malware
JB Fraley - 2017 - search.proquest.com
Malicious Software (malware) attacks across the internet are increasing at an alarming rate.
Cyber-attacks have become increasingly more sophisticated and targeted. These targeted …
Cyber-attacks have become increasingly more sophisticated and targeted. These targeted …
Identificación de" malware" perteneciente a ataques APT mediante la selección de características altamente discriminatorias usando técnicas de" Machine Learning"
LF Martín Liras - 2023 - portalcienciaytecnologia.jcyl.es
Esta tesis persigue realizar una aportación a la detección de los ataques de ciberseguridad
denominados “amenazas persistentes avanzadas (APT)”. Estos ataques se caracterizan por …
denominados “amenazas persistentes avanzadas (APT)”. Estos ataques se caracterizan por …
Ethical Issues in cybersecurity: employing red teams, responding to ransomware attacks and attempting botnet takedowns
G Morgan - 2021 - doras.dcu.ie
The following four research questions are analysed in this thesis: What are the ethical issues
that arise in cybersecurity in the business domain? Is it ethically appropriate for …
that arise in cybersecurity in the business domain? Is it ethically appropriate for …
Mitigating advanced persistent threats using A combined static-rule and machine learning-based technique
O Adelaiye, A Ajibola - 2019 15th International Conference on …, 2019 - ieeexplore.ieee.org
Advanced Persistent Threat is a targeted attack method used to maintain undetected
unauthorized access over an extended period to exfiltrate valuable data. The inability of …
unauthorized access over an extended period to exfiltrate valuable data. The inability of …