A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dissecting a Social Botnet
2015
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW '15
Our analysis is based on a qualitative coding for approximately 3000 tweets in Arabic and English from the Syrian social bot that was active for 35 weeks on Twitter before it was shutdown. ...
In this paper we considered one specific social botnet in Twitter to understand how it grows over time, how the content of tweets by the social botnet differ from regular users in the same dataset, and ...
In particular, the volume of SSB's networking activity spiked on week 28. However, despite this immense volume, the SSB was not immediately shutdown. ...
doi:10.1145/2675133.2675208
dblp:conf/cscw/AbokhodairYM15
fatcat:szudxujcurdbdkqeeyi3ex2cnu
A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
2014
International Journal of Grid and Utility Computing
He serves/has served the editorial board of over 50 international journals, guest-edited 40 special issues on various topics. ...
He works in a multidisciplinary environment involving machine (network) intelligence, cyber security, sensor networks, web intelligence, scheduling and data mining. ...
Type 1: botnets Botnet (Robot Network) is a group of computers that injects malicious requests towards the DC and makes the DC resources unavailable to legitimate users. ...
doi:10.1504/ijguc.2014.065384
fatcat:zztqkeino5glpalnsxvprvdgs4
Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies
2021
IEEE Internet of Things Journal
A 2020 study conducted by Nokia's threat intelligence labs, for example, indicated that IoT devices account for almost 30% of the attacks encountered in mobile and wireless networks (e.g., WiFi, Bluetooth ...
Despite the development of energy efficient communication and control protocols for IoT to overcome such issues, vulnerabilities in such protocols can still be stealthily lurking. ...
He served as the Chairman of the Computational Intelligence Society in the IEEE Victoria Section and also as the Chairman of Professional and Career Activities for the IEEE Queensland Section. ...
doi:10.1109/jiot.2021.3079916
fatcat:rfmkc6wrk5co3i7bl44ar432bi
Toward a Culture of Cybersecurity Research
2008
Social Science Research Network
Research offers great promise of addressing cybersecurity threats in the short and long term. ...
Progress in cybersecurity research, however, is beset by a lack of access data from communications networks. ...
In both of these uses, the wide distribution of computers in the botnet work to the attackers' advantage and against attack identification and analysis. ...
doi:10.2139/ssrn.1113014
fatcat:mmza4omw65c7lgcbqsigtzu3km
Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context
2021
CrimRxiv
Research assistance was provided by Tessa Cole and David Flint. Editorial assistance was provided by Isobel Scavetta. ...
For instance, the BlackShades botnet consisted of a network of computers that infected nearly half a million machines across ten countries. ...
A botnet is a network of computers infected by malicious codes, which are controlled by an attacker, making the affected computers work in a joint manner. ...
doi:10.21428/cb6ab371.5f335e6f
fatcat:vmrt7shntreqbg2z5mgysr5anq
Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS
2020
IEEE Access
However, such an alternative comes with its own security concerns and issues, as any introduction and adoption of a new technology typically does -let alone a disruptive one. ...
At the same time, over the past years there have been considerable attempts to address the security and privacy issues affecting the Domain Name System (DNS). ...
In fact, the use of the blockhain DNS from various botnets 12 to connect to the C2 servers has reportedly created more issues in the analysis, attribution, and takedown. ...
doi:10.1109/access.2020.3004727
fatcat:wvydbzpl2zgfrjwdv3ngn7nxha
Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review
[article]
2018
arXiv
pre-print
Context: Big Data Cybersecurity Analytics is aimed at protecting networks, computers, and data from unauthorized access by analysing security event data using big data tools and technologies. ...
The identified tactics include six performance tactics, four accuracy tactics, two scalability tactics, three reliability tactics, and one security and usability tactic each. ...
For example, the paper "A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures" is identified by S10. ...
arXiv:1802.03178v1
fatcat:m6yigyrqrvcpdhg7qxncdh3lsi
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems
2017
Computers & security
logic analysis, it detects and prevents intrusions more efficiently. ...
Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving ...
Acknowledgements Ahmed Patel, co-author, wishes to thank CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior) for sponsoring his one year stay as Senior Visiting Professor through the "Projeto ...
doi:10.1016/j.cose.2016.07.002
fatcat:g5ftx3fexvbenc4shzum5lr7ze
Cybercrime Lawmaking and Human Rights in Ethiopia
2021
Mizan Law Review
Ethiopia has embarked upon an ambitious project of revising a number of laws with a view to entrench human rights and democratic governance. ...
Part of this legal reform program has been the revision of Computer Crime Proclamation No 958/2016. ...
of the Federal Attorney General incidentally offered a legal justification of sorts for Internet shutdowns in its formal comments on a report of the UN Special Rapporteur on Freedom of Opinion and Expression ...
doi:10.4314/mlr.v15i1.3
fatcat:ipdikjp6vvg4tlmgr2issut6ba
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey
2020
IEEE Access
Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces ...
Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper. ...
He also guest edited many special issues in leading technical journals (i.e., the IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, the Journal of Networks and Computer Applications, Information Sciences, and ...
doi:10.1109/access.2020.3022661
fatcat:li7hno53n5fm5dn4lgd3bfjafy
The Emergence of the Lean Global Startup as a New Type of Firm
2015
Technology Innovation Management Review
The TIM Review focuses on the theories, strategies, and tools that help small and large technology companies succeed. ...
Overview The Technology Innovation Management Review (TIM Review) provides insights about the issues and emerging trends relevant to launching and growing technology businesses. ...
This work is part of the research program "Towards Relational Business Practices" (REBUS), which is one of the research programs of the Finnish Metals and Engineering Competence Cluster, FIMECC. Q&A. ...
doi:10.22215/timreview/941
fatcat:el6gve4wgnb2pnmumqex2vae7e
An Approach to Resisting Malformed and Flooding Attacks on SIP Servers
2015
Journal of Networks
Abstract-A Mesh Network Topological Optimization and Routing II (MENTOR-II) algorithm is a low complexity and efficient network design algorithm for IP networks with OSPF routing protocol in which appropriate ...
The Q-MENTOR are evaluated in terms of installation cost, routing cost and reliability for 486 network design conditions. ...
as Network Security Situational Awareness NSSA, DDoS defense, worm and virus detection, botnet detection, etc. ...
doi:10.4304/jnw.10.2.77-84
fatcat:dt4cpvazwndsthm36jr32hkgxi
Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019
2019
The Journal of British Blockchain Association
Virus scanning and network protection rules could be used to search detect and block hosted material entering or leaving a network. ...
Virus scanning and network protection rules could be used to search detect and block hosted material entering or leaving a network. ...
Competing Interests: The JBBA | Volume 2 | Issue 2 | October 2019 j b b a t h e 62 [14] J. K.-S. Liew and L. ...
doi:10.31585/jbba-2-2-(full)2019
fatcat:lsnv4wnuhvhpne33puatdc4p4e
A Reasoned Approach to Prohibiting the Bis in Idem : Between the Double and the Triple Identities
2022
eucrim – The European Criminal Law Associations Forum
Fresh Perspectives on Unresolved Problems in European Criminal/ Administrative Law The Associations for European Criminal Law and the Protection of Financial Interests of the EU is a network of academics ...
For other language versions, please navigate using the external website. ...
The EPPO assumed its investigatory and prosecutorial tasks on 1 June 2021 (special eucrim issue 1/2021). ...
doi:10.30709/eucrim-2021-032
fatcat:qygvgdtjwvejzbepy5oh4uqmna
Cybercrime precursors: towards a model of offender resources
[article]
2016
Cybercrime is facilitated by crimeware, a specific type of computer software, and a focus on this element can help better understand how cybercrime evolves. Keywords: Cybercri [...] ...
This thesis applies Ekblom and Tilley's concept of offender resources to the study of criminal behaviour on the Internet. ...
A network of compromised computers, or the botnet, is in itself a case of unauthorised access of computers. ...
doi:10.25911/5d778a24d8836
fatcat:juofiyuoqjg4pp5mdejwrz3obq
« Previous
Showing results 1 — 15 out of 23 results