Malicious developers may succeed at publishing their apps in mobile markets, including the official ones. If reported, the apps will be taken down and the developer accounts possibly …
WK Hauger, MS Olivier - SAIEE Africa Research Journal, 2018 - ieeexplore.ieee.org
NoSQL databases have gained a lot of popularity over the last few years. They are now used in many new system implementations that work with vast amounts of data. Such data …
Malware is a problem in current digital society, since it can cause economic or physical damage and in the end disrupt society as a whole. Although anti-virus solutions attempt to …
T Sasaki, K Yoshioka… - 2023 11th International …, 2023 - ieeexplore.ieee.org
Cyber attacks are reported daily and have become a major social issue. However, it is still unclear who the attackers are and their background. In this paper, using OSINT-based …
MS Abu, SR Selamat, R Yusof… - International Journal of …, 2021 - pdfs.semanticscholar.org
Tactic, Technique and Procedure (TTPs) in launching cyberattack that make it less predictable, more persistent, resourceful and better funded. So many organisation has opted …
M Alkaabi, SO Olatunji - 2020 30th International Conference on …, 2020 - ieeexplore.ieee.org
Cyberspace is a virtual environment where communication over computer networks happen. This space is vulnerable to cyber-attacks. After the attack happened, it has left many …
JD Jolley - State Responsibility, and the Duty to Prevent Malicious …, 2017 - papers.ssrn.com
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in international law, pose a significant problem to the international community. Attributing …
This PhD thesis aims to contribute to the Cyber Security body of knowledge and its Computer Forensic field, still in its infancy when comparing with other forensic sciences …
Big Data Systems encompass massive challenges related to data diversity, storage mechanisms, and requirements of massive computational power. Further, capabilities of big …