NI Che Mat, N Jamil, Y Yusoff… - Journal of …, 2024 - academic.oup.com
Advanced persistent threats (APTs) pose significant security-related challenges to organizations owing to their sophisticated and persistent nature, and are inimical to the …
Zero-day malware samples pose a considerable danger to users as implicitly there are no documented defences for previously unseen, newly encountered behaviour. Malware …
We consider the problem of automating the mapping of observed vulnerabilities in software listed in Common Vulnerabilities and Exposures (CVE) reports to weaknesses listed in …
The dramatic increase in devices and services that has characterized modern societies in recent decades, boosted by the exponential growth of ever faster network connections and …
S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological …
One major threat to Software Defined Network (SDN) environments and other computing systems is Distributed Denial of Service (DDoS) attacks. For the longest time, conventional …
SC Ngwobia, A Ralescu, D Kapp, T Kebede - Computers & Security, 2023 - Elsevier
The availability of sophisticated IT tools has provided computer system attackers with the capacity to develop dangerous metamorphic or polymorphic malware. Such malware …
M Al-Naday, M Reed, V Dobre, S Toor… - … 26th Conference on …, 2023 - ieeexplore.ieee.org
With Digital transformation, the diversity of services and infrastructure in backhaul fog network (s) is rising to unprecedented levels. This is causing a rising threat of a wider range …
With the emergence of smartphones, Android has become a widely used mobile operating system. However, it is vulnerable when encountering various types of attacks. Every day …