Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure

H Riggs, S Tufail, I Parvez, M Tariq, MA Khan, A Amir… - Sensors, 2023 - mdpi.com
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …

Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing

H Suryotrisongko, Y Musashi, A Tsuneda… - IEEE …, 2022 - ieeexplore.ieee.org
We investigated 12 years DNS query logs of our campus network and identified phenomena
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …

Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator

K Kim, Y Shin, J Lee, K Lee - Sensors, 2021 - mdpi.com
During the past decade, mobile attacks have been established as an indispensable attack
vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the …

The Malware as a Service ecosystem

C Patsakis, D Arroyo, F Casino - Malware: Handbook of Prevention and …, 2024 - Springer
The goal of this chapter is to illuminate the operational frameworks, key actors, and
significant cybersecurity implications of the malware as a service (MaaS) ecosystem …

[图书][B] Der Kampf um die Wahrheit: Verschwörungstheorien zwischen Fake, Fiktion und Fakten

A Anton, A Schink - 2021 - ixtheo.de
Die Soziologen Andreas Anton und Alan Schink geben in diesem Buch einen
wissenschaftlich fundierten Überblick über Verschwörungstheorien und echte …

Attribution across cyber attack types: network intrusions and information operations

S Goel, B Nussbaum - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The objective of this paper is to articulate the problem of attribution in cyber warfare
incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As …

A comprehensive survey of advanced persistent threat attribution: Taxonomy, methods, challenges and open research problems

N Rani, B Saha, SK Shukla - arXiv preprint arXiv:2409.11415, 2024 - arxiv.org
Advanced Persistent Threat (APT) attribution is a critical challenge in cybersecurity and
implies the process of accurately identifying the perpetrators behind sophisticated cyber …

[HTML][HTML] Анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности при реализации целевых атак

И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

Electronic attacks as a cyber false flag against maritime radars systems

G Longo, A Merlo, A Armando… - 2023 IEEE 48th …, 2023 - ieeexplore.ieee.org
Radar systems have long been essential for safe navigation in various transportation
sectors, including aviation, maritime, and automotive. While these systems provide …