From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …
attacks. This holds true, as more and more organizations admit compromises on a daily …
Systematically understanding the cyber attack business: A survey
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …
publicly available reports, this article conducts an extensive and consistent survey of the …
On the feasibility of online malware detection with performance counters
The proliferation of computers in any domain is followed by the proliferation of malware in
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …
Measuring the cost of cybercrime
This chapter documents what we believe to be the first systematic study of the costs of
cybercrime. The initial workshop paper was prepared in response to a request from the UK …
cybercrime. The initial workshop paper was prepared in response to a request from the UK …
[KIRJA][B] Machine learning and security: Protecting systems with data and algorithms
C Chio, D Freeman - 2018 - books.google.com
Can machine learning techniques solve our computer security problems and finally put an
end to the cat-and-mouse game between attackers and defenders? Or is this hope merely …
end to the cat-and-mouse game between attackers and defenders? Or is this hope merely …
Paybreak: Defense against cryptographic ransomware
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral
means to achieve monetary gains. Recently, malware known as ransomware started to …
means to achieve monetary gains. Recently, malware known as ransomware started to …
A survey of mobile malware in the wild
Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current
state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS …
state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS …
[KIRJA][B] Data analytics for cybersecurity
VP Janeja - 2022 - books.google.com
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber
threats. We need to use multiple types of tools and techniques to learn and understand the …
threats. We need to use multiple types of tools and techniques to learn and understand the …
The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
Measuring the changing cost of cybercrime
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …
report what has changed in the seven years since. The period has seen major platform …