Cloud security issues and challenges: A survey
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …
amount of virtual storage. The main features of cloud computing is that the user does not …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Cryptolock (and drop it): stop** ransomware attacks on user data
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …
Malware dynamic analysis evasion techniques: A survey
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
[PDF][PDF] A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis
The threats malware pose to the people around the world are increasing rapidly. A software
that sneaks to your computer system without your knowledge with a harmful intent to disrupt …
that sneaks to your computer system without your knowledge with a harmful intent to disrupt …
Security issues in cloud environments: a survey
DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …
integration of cloud environments in the industry, which has been consequently motivating …
Automatic analysis of malware behavior using machine learning
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …
systems. The amount and diversity of its variants render classic security defenses ineffective …
A survey on automated dynamic malware-analysis techniques and tools
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …
Receiving thousands of new samples every day is not uncommon. The signatures that …
Detecting environment-sensitive malware
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis
Android dominates the smartphone operating system market and consequently has attracted
the attention of malware authors and researchers alike. Despite the considerable number of …
the attention of malware authors and researchers alike. Despite the considerable number of …