|
|
|
Fahim Sufi
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe...
ver más
|
|
|
|
|
|
|
Xiaofeng Lu, Fei Wang, Cheng Jiang and Pietro Lio
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features ar...
ver más
|
|
|
|
|
|
|
KyungHyun Han and Seong Oun Hwang
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection ...
ver más
|
|
|
|