نتایج جستجو برای: malicious user

تعداد نتایج: 253175  

2012
Andrei Bacs Remco Vermeulen Asia Slowinska Herbert Bos

Recovering from attacks is hard and gets harder as the time between the initial infection and its detection increases. Which files did the attackers modify? Did any of user data depend on malicious inputs? Can I still trust my own documents or binaries? When malcode has been active for some time and its actions are mixed with those of benign applications, these questions are impossible to answe...

2010
W. Sabrina Lin H. Vicky Zhao K. J. Ray Liu

Human behavior analysis in video sharing social networks investigates the impact of human dynamics on video sharing systems and has become an emerging research area. Users watching video streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus they might want to cooperate with each other to obtain better video quality. These users form...

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

2010
Dina Hadziosmanovic Damiano Bolzoni Pieter H. Hartel

Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavio...

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

2004
Louis Kruger Hao Wang Patrick D. McDaniel

Malicious code can wreak havoc on our cyberinfrastructure. Hence, discovering and containing malicious code is an important goal. This paper focuses on privacy-violating malicious code. Examples of privacy violations are leaking private user data to an external entity or downloading data to a user’s host without their permission. Spyware, which has recently received considerable attention in th...

Journal: :CoRR 2017
Amir Javed Pete Burnap Omer F. Rana

The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack usin...

Journal: :Legal Studies 2018

Journal: :International Journal of Information and Computer Security 2022

In recent years, the damage cost caused by malwares is huge. Thus, malware detection a big challenge. The task of specifying takes huge amount time and engineering effort since it currently requires manual study malicious code. in order to avoid tedious analysis codes, this has be automatised. To aim, we propose work represent behaviours using extended API call graphs, where nodes correspond fu...

2016
Sajjad Arshad Amin Kharraz William Robertson

Modern websites include various types of third-party content such as JavaScript, images, stylesheets, and Flash objects in order to create interactive user interfaces. In addition to explicit inclusion of third-party content by website publishers, ISPs and browser extensions are hijacking web browsing sessions with increasing frequency to inject third-party content (e.g., ads). However, third-p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید