缓和 发表于 2025-3-28 17:56:04
http://reply.papertrans.cn/25/2418/241784/241784_41.pngBANAL 发表于 2025-3-28 21:57:09
A Practical Analysis of the Rise in Mobile Phishing,desire for a greater return on investment from their attacks against the common internet user. The digital landscape has been ever-changing since the emergence of mobile technologies. The intersection of the internet and the growing mobile user-base fueled the natural progression of phishers to targdelegate 发表于 2025-3-29 02:28:18
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques,table nature and widespread adoption. The flexibility and power of this format are not only leveraged by benign users, but from hackers as well who have been working to exploit various types of vulnerabilities, overcome security restrictions, and then transform the PDF format in one among the leadin剥皮 发表于 2025-3-29 06:34:11
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence, for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the corner st危机 发表于 2025-3-29 08:46:21
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Caserelated to software vulnerabilities. However, many threat intelligence platforms and industry-wide standards are relying on CVSS score to evaluate cyber security compliance. This paper suggests several improvements to the calculation of Impact and Exploitability sub-scores within the CVSS, improve iexclusice 发表于 2025-3-29 13:25:05
A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content,ent the attacker’s actions but instead aims to learn about the attacker’s behavior. In this paper, we discuss the idea of deceiving attackers with fake services and fabricated content in order to find out more about malware’s functionality and to hamper cyber intelligence. The effects of false dataHaphazard 发表于 2025-3-29 19:05:41
Investigating the Possibility of Data Leakage in Time of Live VM Migration,, VMs can be transferred from a source host to a destination host due to various reasons such as maintenance of the source host or resource requirements of the VMs. The VM migration can happen in two ways, live and offline migration. In time of live VM migration, VMs get transferred from a source hoGROG 发表于 2025-3-29 22:59:07
http://reply.papertrans.cn/25/2418/241784/241784_48.png受伤 发表于 2025-3-30 03:01:00
http://reply.papertrans.cn/25/2418/241784/241784_49.pngOUTRE 发表于 2025-3-30 08:01:14
Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies,lways-available storage, a lot of private and confidential data are now stored on different cloud platforms. Being such a gold mine of data, cloud platforms are among the most valuable targets for attackers. Therefore, many forensics investigators have tried to develop tools, tactics and procedures