Articoli di riviste sul tema "Data exfiltration attack"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Data exfiltration attack".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Zimba, Aaron, e Mumbi Chishimba. "Exploitation of DNS Tunneling for Optimization of Data Exfiltration in Malware-free APT Intrusions". Zambia ICT Journal 1, n. 1 (11 dicembre 2017): 51–56. http://dx.doi.org/10.33260/zictjournal.v1i1.26.
Testo completoUllah, Faheem, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar e Awais Rashid. "Data exfiltration: A review of external attack vectors and countermeasures". Journal of Network and Computer Applications 101 (gennaio 2018): 18–54. http://dx.doi.org/10.1016/j.jnca.2017.10.016.
Testo completoDo, Quang, Ben Martini e Kim-Kwang Raymond Choo. "A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers". IEEE Transactions on Information Forensics and Security 11, n. 10 (ottobre 2016): 2174–86. http://dx.doi.org/10.1109/tifs.2016.2578285.
Testo completoMeyers, Vincent, Michael Hefenbrock, Dennis Gnad e Mehdi Tahoori. "Leveraging Neural Trojan Side-Channels for Output Exfiltration". Cryptography 9, n. 1 (7 gennaio 2025): 5. https://doi.org/10.3390/cryptography9010005.
Testo completoSachintha, Shakthi, Nhien-An Le-Khac, Mark Scanlon e Asanka P. Sayakkara. "Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems". Applied Sciences 13, n. 5 (24 febbraio 2023): 2928. http://dx.doi.org/10.3390/app13052928.
Testo completoSingh, Sanjeev Pratap, e Naveed Afzal. "The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration". International Journal of Network Security & Its Applications 16, n. 3 (29 maggio 2024): 23–40. http://dx.doi.org/10.5121/ijnsa.2024.16302.
Testo completoChattra, Eka, e Obrin Candra Brillyant. "Implementation of Meltdown Attack Simulation for Cybersecurity Awareness Material". ACMIT Proceedings 7, n. 1 (7 luglio 2021): 6–13. http://dx.doi.org/10.33555/acmit.v7i1.102.
Testo completoRietz, René, Radoslaw Cwalinski, Hartmut König e Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks". Journal of Computer Networks and Communications 2018 (21 novembre 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.
Testo completoAcar, Gunes, Steven Englehardt e Arvind Narayanan. "No boundaries: data exfiltration by third parties embedded on web pages". Proceedings on Privacy Enhancing Technologies 2020, n. 4 (1 ottobre 2020): 220–38. http://dx.doi.org/10.2478/popets-2020-0070.
Testo completoAksoy, Ahmet, Luis Valle e Gorkem Kar. "Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection". Electronics 13, n. 2 (9 gennaio 2024): 293. http://dx.doi.org/10.3390/electronics13020293.
Testo completoMohamed, Nachaat. "Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework". F1000Research 11 (29 settembre 2022): 422. http://dx.doi.org/10.12688/f1000research.109148.3.
Testo completoMohamed, Nachaat. "Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework". F1000Research 11 (25 maggio 2022): 422. http://dx.doi.org/10.12688/f1000research.109148.2.
Testo completoMohamed, Nachaat. "Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework". F1000Research 11 (14 aprile 2022): 422. http://dx.doi.org/10.12688/f1000research.109148.1.
Testo completoHagen, Raymond André, e Kirsi Helkala. "Complexity of Contemporary Indicators of Compromise". European Conference on Cyber Warfare and Security 23, n. 1 (21 giugno 2024): 697–707. http://dx.doi.org/10.34190/eccws.23.1.2149.
Testo completoSabir, Bushra, Faheem Ullah, M. Ali Babar e Raj Gaire. "Machine Learning for Detecting Data Exfiltration". ACM Computing Surveys 54, n. 3 (giugno 2021): 1–47. http://dx.doi.org/10.1145/3442181.
Testo completoWilson, PhD, Duane, e Jeff Avery. "Mitigating Data Exfiltration in SaaS Clouds". Journal of Business, Technology and Leadership 1, n. 1 (17 aprile 2019): 9. http://dx.doi.org/10.54845/btljournal.v1i1.2.
Testo completoWillems, Daan, Katharina Kohls, Bob van der Kamp e Harald Vranken. "Data Exfiltration Detection on Network Metadata with Autoencoders". Electronics 12, n. 12 (8 giugno 2023): 2584. http://dx.doi.org/10.3390/electronics12122584.
Testo completoMundt, Michael, e Harald Baier. "Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update". International Journal on Cybernetics & Informatics 12, n. 5 (12 agosto 2023): 43–59. http://dx.doi.org/10.5121/ijci.2023.120505.
Testo completoJabar, Farah H. A., Janatul Islah Mohammad, Ahmad Faizal Mohd Zain e Abu Bakar Hasan. "Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review". Indonesian Journal of Electrical Engineering and Computer Science 10, n. 2 (1 maggio 2018): 490. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp490-497.
Testo completoMasters, Andrew, e Vijay K. Madisetti. "Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters". Journal of Information Security 15, n. 04 (2024): 433–47. http://dx.doi.org/10.4236/jis.2024.154025.
Testo completoAbualghanam, Orieb, Hadeel Alazzam, Basima Elshqeirat, Mohammad Qatawneh e Mohammed Amin Almaiah. "Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning". Electronics 12, n. 6 (20 marzo 2023): 1467. http://dx.doi.org/10.3390/electronics12061467.
Testo completoAl-Kadhimi, Amjed Ahmed, Manmeet Mahinderjit Singh e Mohd Nor Akmal Khalid. "A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence Techniques". Applied Sciences 13, n. 14 (10 luglio 2023): 8056. http://dx.doi.org/10.3390/app13148056.
Testo completoHakim, Arif Rahman, Kalamullah Ramli, Muhammad Salman e Esti Rahmawati Agustina. "Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies". IIUM Engineering Journal 26, n. 1 (10 gennaio 2025): 420–36. https://doi.org/10.31436/iiumej.v26i1.3547.
Testo completoLi, Richard, e Michail Tsikerdekis. "Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average". Journal of Cybersecurity and Privacy 3, n. 3 (1 agosto 2023): 435–50. http://dx.doi.org/10.3390/jcp3030022.
Testo completoAntić, Vladimir, Danijela Protić, Miomir Stanković, Radomir Prodanović, Miodrag Manić, Gordana Ostojić, Stevan Stankovski e Denis Kučević. "Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling". Applied Sciences 14, n. 11 (3 giugno 2024): 4830. http://dx.doi.org/10.3390/app14114830.
Testo completoKarthikeyan, Swathi Priya. "Rising Threat of AI-Driven Cybersecurity Attacks: Implications for National Security". International Journal for Research in Applied Science and Engineering Technology 12, n. 9 (30 settembre 2024): 756–62. http://dx.doi.org/10.22214/ijraset.2024.64042.
Testo completoChignell, Mark H., Mu-Huan Chung, Yuhong Yang, Greg Cento e Abhay Raman. "Human Factors in Interactive Machine Learning: A Cybersecurity Case Study". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, n. 1 (settembre 2021): 1495–99. http://dx.doi.org/10.1177/1071181321651206.
Testo completoSalat, Lehel, Mastaneh Davis e Nabeel Khan. "DNS Tunnelling, Exfiltration and Detection over Cloud Environments". Sensors 23, n. 5 (2 marzo 2023): 2760. http://dx.doi.org/10.3390/s23052760.
Testo completoIvanova, Vanya, Tasho Tashev e Ivo Draganov. "Detection of IoT based DDoS Attacks by Network Traffic Analysis using Feedforward Neural Networks". International Journal of Circuits, Systems and Signal Processing 16 (15 gennaio 2022): 653–62. http://dx.doi.org/10.46300/9106.2022.16.81.
Testo completoBiberaj, Aleksander, Enida Sheme, Alban Rakipi, Sonila Xhaferllari, Renalda Kushe e Mirjeta Alinci. "Cyber Attack Against E-Albania and Its Social, Economic and Strategic Effects". Journal of Corporate Governance, Insurance, and Risk Management 9, n. 2 (31 dicembre 2022): 341–47. http://dx.doi.org/10.56578/jcgirm090204.
Testo completoS. Shangavi e Dr. T. Suresh Kumar. "A Covert Timing Channels Data Encryption Sceme In Cloud Simulation". South Asian Journal of Engineering and Technology 14, n. 2 (30 aprile 2024): 7–10. http://dx.doi.org/10.26524/sajet.2023.14.3.
Testo completoGhali, Abdulrahman Aminu, Rohiza Ahmad e Hitham Alhussian. "A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach". Electronics 10, n. 11 (27 maggio 2021): 1282. http://dx.doi.org/10.3390/electronics10111282.
Testo completoAlazzam, Hadeel, Aryaf Al-Adwan, Orieb Abualghanam, Esra’a Alhenawi e Abdulsalam Alsmady. "An Improved Binary Owl Feature Selection in the Context of Android Malware Detection". Computers 11, n. 12 (30 novembre 2022): 173. http://dx.doi.org/10.3390/computers11120173.
Testo completoVetter, Michael. "MODEL-BASED SECURITY ANALYSIS OF FPGA DESIGNS THROUGH REINFORCEMENT LEARNING". Acta Polytechnica 59, n. 5 (1 novembre 2019): 518–26. http://dx.doi.org/10.14311/ap.2019.59.0518.
Testo completoYu, Jiyong, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas e Christopher W. Fletcher. "Speculative taint tracking (STT)". Communications of the ACM 64, n. 12 (dicembre 2021): 105–12. http://dx.doi.org/10.1145/3491201.
Testo completoFakiha, Bandr Siraj. "Forensic analysis of bad USB attacks: A methodology for detecting and mitigating malicious USB device activities". Edelweiss Applied Science and Technology 8, n. 5 (19 settembre 2024): 1090–100. http://dx.doi.org/10.55214/25768484.v8i5.1809.
Testo completoHaytham.B. Alaboodi. "Challenges and Recommendations for Improving Blockchain-Based Bank Transfer Security in 5G IoT Applications". Journal of Electrical Systems 20, n. 11s (16 novembre 2024): 1642–52. https://doi.org/10.52783/jes.7559.
Testo completoAnam, Fahri Choirul, Gusti Made Arya Sasmita e I. Putu Agus Eka Pratama. "Implementation of Security Information and Event Management (SIEM) for Monitoring IT Assets Using Alienvault OSSIM (Case Study: Udayana University Information Resources Unit)". JITTER : Jurnal Ilmiah Teknologi dan Komputer 4, n. 3 (19 novembre 2023): 1956. http://dx.doi.org/10.24843/jtrti.2023.v04.i03.p03.
Testo completoChinedu Jude Nzekwe e Christopher J Ozurumba. "Advanced modelling techniques for anomaly detection: A proactive approach to database breach mitigation". International Journal of Science and Research Archive 13, n. 2 (30 dicembre 2024): 2839–909. https://doi.org/10.30574/ijsra.2024.13.2.2511.
Testo completoMartins, Cláudio, e Ibéria Medeiros. "Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy". ACM Transactions on Privacy and Security 25, n. 3 (31 agosto 2022): 1–39. http://dx.doi.org/10.1145/3530977.
Testo completoAnbalagan, E., Dr P. S. V. Srinivasa Rao, Dr Amarendra Alluri, Dr D. Nageswari e Dr R. Kalaivani. "Improving Intrusion Detection using Satin Bowerbird Optimization with Deep Learning Model for IIoT Environment". International Journal of Electrical and Electronics Research 12, n. 1 (20 marzo 2024): 219–27. http://dx.doi.org/10.37391/ijeer.120131.
Testo completoMundt, Michael, e Harald Baier. "Threat-based Simulation of Data Exfiltration Towards Mitigating Multiple Ransomware Extortions". Digital Threats: Research and Practice, 29 ottobre 2022. http://dx.doi.org/10.1145/3568993.
Testo completoLeevy, Joffrey L., John Hancock, Taghi M. Khoshgoftaar e Jared M. Peterson. "IoT information theft prediction using ensemble feature selection". Journal of Big Data 9, n. 1 (6 gennaio 2022). http://dx.doi.org/10.1186/s40537-021-00558-z.
Testo completoJian Malik Hidayat, Herri Setiawan e Tasmi. "ANALISA MALWARE PADA TRAFFIC JARINGAN BERBASIS POLA LALU LINTAS DATA MENGGUNAKAN METODE ANOMALY". PROSIDING SNAST, 23 novembre 2024, E250–258. https://doi.org/10.34151/prosidingsnast.v1i1.5109.
Testo completoYeboah-Ofori, Abel, e Francisca Afua Opoku-Boateng. "Mitigating cybercrimes in an evolving organizational landscape". Continuity & Resilience Review, 21 marzo 2023. http://dx.doi.org/10.1108/crr-09-2022-0017.
Testo completoR, Janaki, Prathap S, Raman R, Tony Wilson I e Yuvaraj J. "SECURE MULTI CLOUD STORAGE APPROACH FOR MULTICLOUD ENVIRONMENTS USING FOG COMPUTING". ShodhKosh: Journal of Visual and Performing Arts 4, n. 1 (30 giugno 2023). https://doi.org/10.29121/shodhkosh.v4.i1.2023.2928.
Testo completoAçıkgözoğlu, Enes. "COMPARISON OF MACHINE LEARNING ALGORITHMS FOR DETECTION OF DATA EXFILTRATION OVER DNS". Yalvaç Akademi Dergisi, 20 agosto 2024. http://dx.doi.org/10.57120/yalvac.1507402.
Testo completoTaofeek, Olayiwola Tokunbo, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara e Oludare Isaac Abiodun. "A COGNITIVE DECEPTION MODEL FOR GENERATING FAKE DOCUMENTS TO CURB DATA EXFILTRATION IN NETWORKS DURING CYBER-ATTACKS". IEEE Access, 2022, 1. http://dx.doi.org/10.1109/access.2022.3166628.
Testo completoKozlenko, Oleh, e Dmytro Zibarov. "Analysis of the core research for vendor email compromise filtering model using machine learning". Theoretical and Applied Cybersecurity 5, n. 1 (19 settembre 2023). http://dx.doi.org/10.20535/tacs.2664-29132023.1.284121.
Testo completoPatharkar, Anay. "Analysis of Various Malicious Payload Deployment Cables". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, n. 07 (11 luglio 2023). http://dx.doi.org/10.55041/ijsrem24367.
Testo completo