Ransomware detection, avoidance, and mitigation scheme: a review and future directions

A Kapoor, A Gupta, R Gupta, S Tanwar, G Sharma… - Sustainability, 2021 - mdpi.com
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …

On the security of TLS in the real world

R Merget - 2023 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - On the security of TLS in the real world Deutsch OPUS UB Bochum RUB
» Bibliotheksportal Home Search Browse Publish FAQ OPUS UB Bochum On the security of …

TLS-Monitor: An Intrusion Detection-based Monitoring Tool for countering TLS Attacks

G Petraglia - 2023 - webthesis.biblio.polito.it
The Transport Layer Security (TLS) protocol is the most used protocol nowadays to securely
establish a safe connection. It is used in many different contexts, such as in authentication …

[PDF][PDF] Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications

Traditionally, the creation of a new web endpoint was seen as a private event, with its
existence unknown to the outside world until deemed appropriate by the site owner. Indeed …