Air‐Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

N Mohamed, SK Almazrouei, A Oubelaid… - Wireless …, 2022 - Wiley Online Library
Several security tools have been described in recent times to assist security teams; however,
the effectiveness and success remain limited to specific devices. Phishing is a type of …

Enhancing cyber-threat intelligence in the arab world: Leveraging ioc and misp integration

IY Alzahrani, S Lee, K Kim - Electronics, 2024 - mdpi.com
Cybercrime threat intelligence enables proactive measures against threat actors and
informed, data-driven security decisions. This study proposes a practical implementation of …

Practical Cyber Threat and OSINT Analysis based on Implementation of CTI Sharing Platform

I Alzahrani, S Lee, K Kim - 2024 - preprints.org
Abstract Cybercrime Threat Intelligence (CTI) allows us to change our actions from reactive
to proactive in the fight against threat actors, and to make more informed, data-driven …

A novel flow-based statistical pattern recognition architecture to detect and classify pivot attacks

RS Marques - 2022 - wlv.openrepository.com
Pivot attack or pivoting is a well-known technique used by threat actors to cover their tracks
and overcome connectivity restrictions imposed by the network defences or topology …

[CITACE][C] Air-Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

P Bottu, J Thomason - … Journal of Wireless Communication Networks and …, 2024