[HTML][HTML] Near-field communication (NFC) cyber threats and mitigation solutions in payment transactions: A review

P Onumadu, H Abroshan - Sensors, 2024 - mdpi.com
Today, many businesses use near-field communications (NFC) payment solutions, which
allow them to receive payments from customers quickly and smoothly. However, this …

A comprehensive survey on stegomalware detection in digital media, research challenges and future directions

LT Badar, B Carminati, E Ferrari - Signal Processing, 2025 - Elsevier
Stegomalware is a malicious activity that employs steganography techniques to hide
malicious code within innocent-looking files. The hidden code can then be executed to …

Dense D2C-Net: dense connection network for display-to-camera communications

N Maharjan, LD Tamang, BW Kim - Optics Express, 2023 - opg.optica.org
In this paper, we introduce a novel Dense D2C-Net, an unobtrusive display-to-camera (D2C)
communication scheme that embeds and extracts additional data via visual content through …

[PDF][PDF] Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning

N Cassavia, L Caviglione, M Guarascio… - Journal of Wireless …, 2022 - jowua.com
Steganography is increasingly exploited by malware to avoid detection and to implement
different advanced offensive schemes. An attack paradigm expected to become widely used …

[HTML][HTML] NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce

AC Rus, M El-Hajj, DK Sarmah - Computers & Security, 2024 - Elsevier
The rise of payment details theft has led to increasing concerns regarding the security of e-
commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which …

Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review

M Mundt, H Baier - International Conference on Digital Forensics and …, 2024 - Springer
Whether it is an insider or an Advanced Persistent Threat (APT), sensitive data is being
stolen. This year's German Federal Office for Information Security (BSI) annual report …

Federated learning for the efficient detection of steganographic threats hidden in image icons

N Cassavia, L Caviglione, M Guarascio… - … Intelligence on Web and …, 2022 - Springer
An increasing number of threat actors takes advantage of information hiding techniques to
prevent detection or to drop payloads containing attack routines. With the ubiquitous …

A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores

N Cassavia, L Caviglione, M Guarascio… - Social Network Analysis …, 2023 - Springer
An increasing volume of malicious software exploits information hiding techniques to cloak
additional attack stages or bypass frameworks enforcing security. This trend has intensified …

[PDF][PDF] ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper).

L Caviglione, C Comito, M Guarascio, G Manco… - SEBD, 2023 - researchgate.net
The exponential growth in the number of cyber threats requires sharing in a timely and
efficient manner a wide range of Indicators of Compromise (IoCs), ie, fragments of forensics …

NAISS: Network Authentication of Images to Stop e-Skimmers

AC Rus - 2023 - essay.utwente.nl
The rise of payment details theft has led to increasing concerns regarding the security of e-
commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which …