Search
Now showing items 1-5 of 5
Steganography Application Using Combination of Movements in a 2D Video Game Platform
(Springer, 2021)
Acceso restringido
Steganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ...
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Acceso abierto
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
Profits at the dawn of cybercrime-as-a-service
(IEEE, 2019)
Acceso restringido
The growing of Information and Communication Technologies (ICT) that has been experienced in recent years, has led to new and more sophisticated ways of doing business. Consequently, worldwide organized criminal groups ...