A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automatically Traceback RDP-Based Targeted Ransomware Attacks
2018
Wireless Communications and Mobile Computing
Furthermore, it also helps us trace back RDP-based ransomware attackers and ransomware makers in the practical applications. ...
To address this problem, we propose a systematic method to fight such specifically targeted ransomware by trapping attackers via a network deception environment and then using traceback techniques to identify ...
Acknowledgments The authors would like to thank VirusTotal for providing ransomware samples and the volunteers from the University of Chinese Academy of Sciences. ...
doi:10.1155/2018/7943586
fatcat:qpy4tcwkafgjbbdxpetg7o3bl4
Secure Computation on 4G/5G Enabled Internet-of-Things
2019
Wireless Communications and Mobile Computing
in G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based ...
situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks ...
in G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based ...
doi:10.1155/2019/3978193
fatcat:53y6dwmzdrewhadmuswyh5uoja
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
[article]
2021
arXiv
pre-print
However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities. ...
Honeypots and honeynets can prove essential to understand and defend against attacks on IoT, IIoT, and CPS environments by attracting attackers and deceiving them into thinking that they have gained access ...
We provided a taxonomy of honeypots and honeynets based on purpose, role, level of interaction, scalability, resource level, availability of source code and target IoT, IIoT, or CPS application. ...
arXiv:2108.02287v1
fatcat:l4b23mylyfd6xjtfhrtsrin3zq