An assistive tool for fileless malware detection

P Borana, V Sihag, G Choudhary… - 2021 World …, 2021 - ieeexplore.ieee.org
While fileless and file-based malware attacks are two completely different approaches, even
their assistance and detection tools vary. Fileless malware executes in a non-traditional way …

Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation

CK Rao, K Singh, A Kumar - Journal of High Speed Networks, 2021 - content.iospress.com
Multi-party computation (MPC) sorting and searching protocols are frequently used in
different databases with varied applications, as in cooperative intrusion detection systems …

A Taxonomy Guideline for Blockchain Platforms

AA Monrat, O Schelén, K Andersson - Journal of Wireless Mobile …, 2023 - diva-portal.org
Traditional methods of reaching consensus in monetary systems depend on centralized
authorities that are considered trustworthy. Blockchain challenges the traditional model by …