Understanding and mitigating banking trojans: From zeus to emotet

KP Grammatikakis, I Koufos… - … on Cyber Security …, 2021 - ieeexplore.ieee.org
Banking Trojans came a long way in the past decade, and the recent case of Emotet showed
their enduring relevance. The evolution of the modern computing landscape can be traced …

Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings

RM Czekster, R Metere, C Morisset - Applied Sciences, 2022 - mdpi.com
Active buildings can be briefly described as smart buildings with distributed and renewable
energy resources able to energise other premises in their neighbourhood. As their energy …

Estimation of the key segments of the cyber crime economics

S Ohrimenco, G Borta, V Cernei - 2021 IEEE 8th International …, 2021 - ieeexplore.ieee.org
Our everyday world is rapidly changing with the help of digital transformation and is
increasingly dependent on information technology, and because of that our society needs to …

Cybersecurity Threats to the Internet of Drones in Critical Infrastructure: An Analysis of Risks and Mitigation Strategies

JD Hjelle, LE Omli-Moe - 2023 - ntnuopen.ntnu.no
As the deployment of Unmanned Aerial Vehicles (UAVs), commonly known as “drones”, is
becoming more and more common, ensuring the cybersecurity of these interconnected …

Cyber Threats Modeling: An Empirical Study

S Ohrimenco, D Orlova, V Cernei - Business Management/Biznes …, 2023 - ceeol.com
The immediacy of this study is determined by the need to fight back against the modern
cyber threats that arise in the process of building a digital economy. The issues of countering …

Expanding the Capabilities of Cyber Range Attack Agents

FL Færøy - 2022 - ntnuopen.ntnu.no
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …

Watershed Segmentation Region-Based Criteria Applied to Thermographic Imagery Within the Water-Space

A Coppola, S Polverino - Proceedings of the International …, 2022 - journal.iccaua.com
The study is focused on the spectral emissivity of non-contact, active, and Non-Destructive
Techniques (NDT), ground and aerial, to be implemented in conjunction with histogram …

[PDF][PDF] Measuring System-on-a-Chip Data Leaks over Radio Transmissions of Small Satellites

T Gallagher - 2024 - ijatl.org
Continuing the topics posed in “Identifying System-on-a-Chip Data Leaks over Radio
Transmissions of Small Satellites”, this article extends the exploration of data leakage of …

[PDF][PDF] Design and Implementation of an Insider Threat Modeling System Using Business Process Models

J Hochuli - files.ifi.uzh.ch
Cybersecurity ist heutzutage ein breit diskutiertes Themengebiet in der Literatur, aber auch
für jedes Unternehmen von hoher praktischer Relevanz. Trotz bestem Schutz der IT …

[PDF][PDF] Web Application Security: Application Firewalls

M Steiner - 2022 - opus.campus02.at
In der heutigen Zeit spielt die Absicherung von modernen IT-Systemen eine wichtige Rolle
und stellt gleichzeitig eine Herausforderung für viele Unternehmen dar. Bei den Versuchen …