找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cyber Threat Intelligence; Ali Dehghantanha,Mauro Conti,Tooska Dargahi Book 2018 Springer International Publishing AG, part of Springer Na

[復(fù)制鏈接]
樓主: Holter-monitor
41#
發(fā)表于 2025-3-28 17:56:04 | 只看該作者
42#
發(fā)表于 2025-3-28 21:57:09 | 只看該作者
A Practical Analysis of the Rise in Mobile Phishing,desire for a greater return on investment from their attacks against the common internet user. The digital landscape has been ever-changing since the emergence of mobile technologies. The intersection of the internet and the growing mobile user-base fueled the natural progression of phishers to targ
43#
發(fā)表于 2025-3-29 02:28:18 | 只看該作者
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques,table nature and widespread adoption. The flexibility and power of this format are not only leveraged by benign users, but from hackers as well who have been working to exploit various types of vulnerabilities, overcome security restrictions, and then transform the PDF format in one among the leadin
44#
發(fā)表于 2025-3-29 06:34:11 | 只看該作者
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence, for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the corner st
45#
發(fā)表于 2025-3-29 08:46:21 | 只看該作者
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Caserelated to software vulnerabilities. However, many threat intelligence platforms and industry-wide standards are relying on CVSS score to evaluate cyber security compliance. This paper suggests several improvements to the calculation of Impact and Exploitability sub-scores within the CVSS, improve i
46#
發(fā)表于 2025-3-29 13:25:05 | 只看該作者
A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content,ent the attacker’s actions but instead aims to learn about the attacker’s behavior. In this paper, we discuss the idea of deceiving attackers with fake services and fabricated content in order to find out more about malware’s functionality and to hamper cyber intelligence. The effects of false data
47#
發(fā)表于 2025-3-29 19:05:41 | 只看該作者
Investigating the Possibility of Data Leakage in Time of Live VM Migration,, VMs can be transferred from a source host to a destination host due to various reasons such as maintenance of the source host or resource requirements of the VMs. The VM migration can happen in two ways, live and offline migration. In time of live VM migration, VMs get transferred from a source ho
48#
發(fā)表于 2025-3-29 22:59:07 | 只看該作者
49#
發(fā)表于 2025-3-30 03:01:00 | 只看該作者
50#
發(fā)表于 2025-3-30 08:01:14 | 只看該作者
Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies,lways-available storage, a lot of private and confidential data are now stored on different cloud platforms. Being such a gold mine of data, cloud platforms are among the most valuable targets for attackers. Therefore, many forensics investigators have tried to develop tools, tactics and procedures
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 23:40
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
叙永县| 桂平市| 崇阳县| 韶山市| 白沙| 黎城县| 阜宁县| 抚顺市| 故城县| 景洪市| 莒南县| 上蔡县| 武安市| 孟州市| 朔州市| 全南县| 盈江县| 即墨市| 丁青县| 泊头市| 闽清县| 志丹县| 安阳县| 屯门区| 临邑县| 昌图县| 当涂县| 岚皋县| 阿城市| 阿坝县| 遵化市| 宁武县| 三门峡市| 南木林县| 大田县| 沭阳县| 越西县| 阿克陶县| 普陀区| 宝清县| 海淀区|