-
1Report
المؤلفون: Burgess, Jonah
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2211.15405
-
2Report
المؤلفون: Burgess, Jonah
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2211.15404
-
3Dissertation/ Thesis
المؤلفون: Burgess, Jonah
المساهمون: McLaughlin, Kieran, Sezer, Sakir
مصطلحات موضوعية: malware detection, malware analysis, cyber-security, cybercrime, machine learning, information and technology
-
4Academic Journal
المؤلفون: Burgess, Jonah, O'Kane, Philip, Sezer, Sakir, Carlin, Domhnall
المصدر: Burgess , J , O'Kane , P , Sezer , S & Carlin , D 2021 , ' LSTM RNN: Detecting Exploit Kits using Redirection Chain Sequences ' , Cybersecurity , vol. 4 , 25 . https://doi.org/10.1186/s42400-021-00093-7
مصطلحات موضوعية: Exploit Kits, Malware, LSTM, Deep Learning
وصف الملف: application/pdf
-
5Academic Journal
المؤلفون: Burgess, Jonah, Carlin, Domhnall, O'Kane, Philip, Sezer, Sakir
المصدر: Burgess , J , Carlin , D , O'Kane , P & Sezer , S 2020 , REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic . in 2020 IEEE Conference on Communications and Network Security (CNS): Proceedings . , 1570641813 , Institute of Electrical and Electronics Engineers Inc. , IEEE Conference on Communications and Network Security , Avignon , France , 29/06/2020 . https://doi.org/10.1109/CNS48642.2020.9162304
مصطلحات موضوعية: Exploit Kits, Web Security, Malware, Cyber-Security, Cloud Security
وصف الملف: application/pdf
-
6Academic Journal
المؤلفون: Carlin, Domhnall, Burgess, Jonah, O'Kane, Philip, Sezer, Sakir
المصدر: Carlin , D , Burgess , J , O'Kane , P & Sezer , S 2020 , ' You Could Be Mine(d): The Rise of Cryptojacking ' , IEEE Security & Privacy Magazine , vol. 18 , no. 2 , pp. 16-22 . https://doi.org/10.1109/MSEC.2019.2920585
مصطلحات موضوعية: Security, cyber attacks, Cyber defence, Malware, /dk/atira/pure/subjectarea/asjc/1700/1700, name=General Computer Science, /dk/atira/pure/subjectarea/asjc/1700/1705, name=Computer Networks and Communications, /dk/atira/pure/subjectarea/asjc/1700/1712, name=Software
وصف الملف: application/pdf
-
7Academic Journal
المؤلفون: Burgess, Jonah, O'Kane, Philip, Carlin, Domhnall, Sezer, Sakir
المصدر: Burgess , J , O'Kane , P , Carlin , D & Sezer , S 2019 , MANiC: Multi-step Assessment for Crypto-miners . in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom . Institute of Electrical and Electronics Engineers Inc. , International Conference on Cyber Security and Protection of Digital Services , Oxford , United Kingdom , 03/06/2019 . https://doi.org/10.1109/CyberSecPODS.2019.8885003
مصطلحات موضوعية: CryptoJacking, Malware, Cyber-Security
وصف الملف: application/pdf
-
8Academic Journal
المؤلفون: Carlin, Domhnall, O'Kane, Philip, Sezer, Sakir, Burgess, Jonah
المصدر: Carlin , D , O'Kane , P , Sezer , S & Burgess , J 2018 , Detecting Cryptomining Using Dynamic Analysis . in Proceedings of the 2018 International conference on privacy, security, and trust (PST 2018) . Privacy, Security and Trust 2018 , Belfast , United Kingdom , 28/08/2018 .
مصطلحات موضوعية: /dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutions, name=SDG 16 - Peace, Justice and Strong Institutions
وصف الملف: application/pdf
-
9Book
المؤلفون: Burgess, Jonah
المصدر: Burgess , J 2017 , Honey Encryption Review .
مصطلحات موضوعية: Cryptography, Honey Encryption, Honey Objects, Brute-force Attack, Password Cracking, Password-based Encryption, Distribution-Transforming Encoders
وصف الملف: application/pdf
-
10Book
المؤلفون: Burgess, Jonah
المصدر: Burgess , J 2017 , Malware and Exploits on the Dark Web .
مصطلحات موضوعية: Dark Web, Darknet, Cryptomarkets, Tor, Crimeware, Hacker Forums, Malware, Exploits, Zero-days, Threat Intelligence, Cyber-Security
وصف الملف: application/pdf
-
11Book
المؤلفون: Burgess, Jonah
المصدر: Burgess , J 2016 , Modern DDoS Attacks and Defences - Survey .
مصطلحات موضوعية: Denial of Service, Distributed Denial of Service, Network Security, Network Monitoring, Botnet, Intrusion Detection, DoS, DDoS, NSM
وصف الملف: application/pdf