A comprehensive examination of email spoofing: Issues and prospects for email security

SC Sethuraman, DP VS, T Reddi, MST Reddy… - Computers & …, 2024 - Elsevier
Attackers are becoming more skilled in recent years, using sophisticated technology to
produce look-alike emails that make it difficult to distinguish between real and fake ones …

Intelligent vision-based malware detection and classification using deep random forest paradigm

SA Roseline, S Geetha, S Kadry, Y Nam - IEEE Access, 2020 - ieeexplore.ieee.org
Malware is a rapidly increasing menace to modern computing. Malware authors continually
incorporate various sophisticated features like code obfuscations to create malware variants …

[HTML][HTML] The impact of patch forwarding on the prevalence of computer virus: a theoretical assessment approach

LX Yang, X Yang, Y Wu - Applied Mathematical Modelling, 2017 - Elsevier
Virus patches can be disseminated rapidly through computer networks and take effect as
soon as they have been installed, which significantly enhances their virus-containing …

Disrupting drive-by download networks on Twitter

A Javed, R Ikwu, P Burnap, L Giommoni… - Social Network Analysis …, 2022 - Springer
This paper tests disruption strategies in Twitter networks containing malicious URLs used in
drive-by download attacks. Cybercriminals use popular events that attract a large number of …

Design of multi-view based email classification for IoT systems via semi-supervised learning

W Li, W Meng, Z Tan, Y Xiang - Journal of Network and Computer …, 2019 - Elsevier
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce
users to click and then redirect them to a phishing webpage. To protect IoT systems, email …

Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks

T Wang, Q Wu, S Wen, Y Cai, H Tian, Y Chen, B Wang - Sensors, 2017 - mdpi.com
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless
sensor networks by introducing mobile actuator elements. Previous studies indicated that …

Cyber resilience recovery model to combat zero-day malware attacks

H Tran, E Campos-Nanez, P Fomin, J Wasek - computers & security, 2016 - Elsevier
This paper presents the implementation of an epidemiological model to combat a zero-day
outbreak within a closed network. The proposed dynamic Cyber Resilience Recovery Model …

Detection and modeling of cyber attacks with petri nets

B Jasiul, M Szpyrka, J Śliwa - Entropy, 2014 - mdpi.com
The aim of this article is to present an approach to develop and verify a method of formal
modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that …

HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs

S Shen, H Zhou, S Feng, L Huang, J Liu, S Yu… - Journal of Network and …, 2019 - Elsevier
Heterogeneous wireless sensor networks (HWSNs), as blocks of the Internet of Things, are
vulnerable to malware diffusion breaking the data confidentiality and service availability …

[PDF][PDF] BREAKSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet

C Wang, Y Kuranaga, Y Wang, M Zhang, L Zheng, X Li… - NDSS'24, 2024 - wangchuhan.cn
Email spoofing attacks pose a severe threat to email systems by forging the sender's
address to deceive email recipients. Sender Policy Framework (SPF), an email …