Mnemosyne: An effective and efficient postmortem watering hole attack investigation system

J Allen, Z Yang, M Landen, R Bhat, H Grover… - Proceedings of the …, 2020 - dl.acm.org
Compromising a website that is routinely visited by employees of a targeted organization
has become a popular technique for nation-state level adversaries to penetrate an …

Continuous and multiregional monitoring of malicious hosts

S Fujii, T Sato, S Aoki, Y Tsuda, Y Okano… - Proceedings of the …, 2020 - dl.acm.org
The number of cybersecurity threats has been increasing, and these threats have become
more sophisticated year after year. Malicious hosts play a large role in modern cyberattacks …

Optimizing Proactive Measures for Security Operations

RA Stevens - 2020 - search.proquest.com
Digital security threats may impact governments, businesses, and consumers through
intellectual property theft, loss of physical assets, economic damages, and loss of …