Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

Cyber threats classifications and countermeasures in banking and financial sector

AA Darem, AA Alhashmi, TM Alkhaldi… - IEEE …, 2023 - ieeexplore.ieee.org
The banking and financial sector has always been a prime target for cyber threats due to the
critical nature of the information they handle. With the increasing dependence on technology …

A taxonomy of domain-generation algorithms

AK Sood, S Zeadally - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Domain-generation algorithms (DGAs) allow attackers to manage infection-spreading
websites and command-and-control (C&C) deployments by altering domain names on a …

[图书][B] Identifying the enemy: civilian participation in armed conflict

E Crawford - 2015 - books.google.com
Over the past twenty-five years, significant changes in the conduct of wars have increasingly
placed civilians in traditional military roles-employing civilians to execute drone strikes …

[图书][B] Solving cyber risk: protecting your company and society

A Coburn, E Leverett, G Woo - 2018 - books.google.com
The non-technical handbook for cyber security risk management Solving Cyber Risk distills
a decade of research into a practical framework for cyber security. Blending statistical data …

An empirical study of HTTP-based financial botnets

AK Sood, S Zeadally, RJ Enbody - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Cyber criminals are covertly attacking critical infrastructures, and botnets are a common
component of those attacks. In recent years, botnets have been shifting their focus from …

A survey of similarities in banking malware behaviours

P Black, I Gondal, R Layton - Computers & Security, 2018 - Elsevier
Banking malware are a class of information stealing malicious software that target the
financial industry. Banking malware families have become persistent with new versions …

[HTML][HTML] Анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности при реализации целевых атак

И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

Learning representations for log data in cybersecurity

I Arnaldo, A Cuesta-Infante, A Arun, M Lam… - … and Machine Learning …, 2017 - Springer
We introduce a framework for exploring and learning representations of log data generated
by enterprise-grade security devices with the goal of detecting advanced persistent threats …