Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - Ieee …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Performance evaluation of Botnet DDoS attack detection using machine learning

TA Tuan, HV Long, LH Son, R Kumar… - Evolutionary …, 2020 - Springer
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …

Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

Detecting Denial of Service attacks using machine learning algorithms

K Kumari, M Mrunalini - Journal of Big Data, 2022 - Springer
Abstract Currently, Distributed Denial of Service Attacks are the most dangerous cyber
danger. By inhibiting the server's ability to provide resources to genuine customers, the …

10 years of IoT malware: A feature-based taxonomy

B Vignau, R Khoury, S Hallé - 2019 IEEE 19th International …, 2019 - ieeexplore.ieee.org
Over the past decade, there has been a rapidly growing interest in IoT-connected devices.
But as is usually the case with computer systems and networks, malicious individuals soon …

Ransomware as a service using smart contracts and IPFS

C Karapapas, I Pittaras, N Fotiou… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Decentralized systems, such as distributed ledgers and the InterPlanetary File System
(IPFS), are designed to offer more open and robust services. However, they also create …

Machine learning approaches for ddos attack detection: Naive bayes vs logistic regression

R Latha, SJJ Thangaraj - 2023 Second International …, 2023 - ieeexplore.ieee.org
DDoS assaults are one of the biggest cyber threats. These attacks flood servers with
malicious traffic to prevent them from serving legitimate users. In this case, the server's …

A survey of key technologies for constructing network covert channel

J Tian, G **ong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

Hydras and IPFS: a decentralised playground for malware

C Patsakis, F Casino - International Journal of Information Security, 2019 - Springer
Modern malware can take various forms and has reached a very high level of sophistication
in terms of its penetration, persistence, communication and hiding capabilities. The use of …