chandel 发表于 2025-3-25 04:45:50

http://reply.papertrans.cn/25/2418/241784/241784_21.png

ligature 发表于 2025-3-25 11:26:39

A Practical Analysis of the Rise in Mobile Phishing,et mobile-specific users. This research investigates mobile-specific phishing attacks through the dissection of phishing kits used for the attacks, presentation of real world phishing campaigns, and observations about PayPal’s insight into mobile web-based phishing numbers.

Ingratiate 发表于 2025-3-25 13:16:49

http://reply.papertrans.cn/25/2418/241784/241784_23.png

profligate 发表于 2025-3-25 19:49:30

http://reply.papertrans.cn/25/2418/241784/241784_24.png

原始 发表于 2025-3-25 23:22:18

Keynote Address: AIDS in the United Kingdomta. The framework is validated through experimenting two use-cases on a virtual SDN running on Mininet. Analysis and comparison of Southbound PCAP files and the memory images of switches enabled successful acquisition of forensic evidential artefacts pertaining to these use cases.

RENAL 发表于 2025-3-26 01:01:47

http://reply.papertrans.cn/25/2418/241784/241784_26.png

沟通 发表于 2025-3-26 06:05:52

Stephan Dressler,Matthias Wienoldssment of cloud forensics research trends between 2009 and 2016. Moreover, we provide a classification of cloud forensics process to detect the most profound research areas and highlight remaining challenges.

骇人 发表于 2025-3-26 11:30:02

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques,eys existing state of the art about systems for the detection of malicious PDF files and organizes them in a taxonomy that separately considers the used approaches and the data analyzed to detect the presence of malicious code.

obeisance 发表于 2025-3-26 13:13:48

http://reply.papertrans.cn/25/2418/241784/241784_29.png

代理人 发表于 2025-3-26 18:32:33

Forensics Investigation of OpenFlow-Based SDN Platforms,ta. The framework is validated through experimenting two use-cases on a virtual SDN running on Mininet. Analysis and comparison of Southbound PCAP files and the memory images of switches enabled successful acquisition of forensic evidential artefacts pertaining to these use cases.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Cyber Threat Intelligence; Ali Dehghantanha,Mauro Conti,Tooska Dargahi Book 2018 Springer International Publishing AG, part of Springer Na