6   Artículos

 
en línea
Fahim Sufi    
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xiaofeng Lu, Fei Wang, Cheng Jiang and Pietro Lio    
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
KyungHyun Han and Seong Oun Hwang    
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »