Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Crypto-ransomware: A revision of the state of the art, advances and challenges
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …
Bayesian network based weighted APT attack paths modeling in cloud computing
Security vulnerabilities exhibited in cloud computing components and technologies not
limited to hypervisors, virtual machines, and virtualization present a major security concern …
limited to hypervisors, virtual machines, and virtualization present a major security concern …
[PDF][PDF] Understanding the evolution of ransomware: paradigm shifts in attack structures
The devasting effects of ransomware have continued to grow over the past two decades
which have seen ransomware shift from just being opportunistic attacks to carefully …
which have seen ransomware shift from just being opportunistic attacks to carefully …
[HTML][HTML] A taxonomy for threat actors' persistence techniques
The main contribution of this paper is to provide an accurate taxonomy for Persistence
techniques, which allows the detection of novel techniques and the identification of …
techniques, which allows the detection of novel techniques and the identification of …
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks
Crypto-mining attacks have emerged as a new generation of web-based attacks which have
seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack …
seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack …
Demystifying ransomware attacks: reverse engineering and dynamic malware analysis of wannacry for network and information security
Encryption has protected the Internet for some time now and it has come to raise user trust
on the otherwise unsecure Internet. However, recent years have seen the use of robust …
on the otherwise unsecure Internet. However, recent years have seen the use of robust …
Exploitation of DNS tunneling for optimization of data exfiltration in malware-free APT intrusions
One of the main goals of targeted attacks include data exfiltration. Attackers penetrate
systems using various forms of attack vectors but the hurdle comes in exfiltrating the data …
systems using various forms of attack vectors but the hurdle comes in exfiltrating the data …
Modeling of Advanced Threat Actors: characterization, categorization and detection
A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …
organizations and even whole countries. Our dependency on information technologies …
A monthly snapshot-based approach for threat hunting within Windows IT environments
M Jacquier - 2021 - diva-portal.org
Abstract/Sammanfattning This work aims at implementing a threat hunting method based on
monthly data snapshots in Windows IT environments, and at assessing whether and how …
monthly data snapshots in Windows IT environments, and at assessing whether and how …
[PDF][PDF] A hybrid intelligent intrusion detection system for advanced persistent threats
M Miguez - 2020 - researchbank.ac.nz
Today's world has networks without clear frontiers, where employees can and do work
outside the company protection systems. Furthermore, they use two or more devices …
outside the company protection systems. Furthermore, they use two or more devices …