From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

On the feasibility of online malware detection with performance counters

J Demme, M Maycock, J Schmitz, A Tang… - ACM SIGARCH …, 2013 - dl.acm.org
The proliferation of computers in any domain is followed by the proliferation of malware in
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …

Measuring the cost of cybercrime

R Anderson, C Barton, R Böhme, R Clayton… - The economics of …, 2013 - Springer
This chapter documents what we believe to be the first systematic study of the costs of
cybercrime. The initial workshop paper was prepared in response to a request from the UK …

[KIRJA][B] Machine learning and security: Protecting systems with data and algorithms

C Chio, D Freeman - 2018 - books.google.com
Can machine learning techniques solve our computer security problems and finally put an
end to the cat-and-mouse game between attackers and defenders? Or is this hope merely …

Paybreak: Defense against cryptographic ransomware

E Kolodenker, W Koch, G Stringhini… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral
means to achieve monetary gains. Recently, malware known as ransomware started to …

A survey of mobile malware in the wild

AP Felt, M Finifter, E Chin, S Hanna… - Proceedings of the 1st …, 2011 - dl.acm.org
Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current
state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS …

[KIRJA][B] Data analytics for cybersecurity

VP Janeja - 2022 - books.google.com
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber
threats. We need to use multiple types of tools and techniques to learn and understand the …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …

Measuring the changing cost of cybercrime

R Anderson, C Barton, R Böhme… - The 18th Annual …, 2019 - research.ed.ac.uk
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …