Malware has evolved from viruses attacking single victims to more sophisticated malware with disruptive purposes. For example, WannaCry ransomware attacks led to hundreds of disruption to NHS care in 2017. Although organizations might have invested in security technologies, their susceptibility to WannaCry hints that the problem goes beyond technology. Security Operations Centres (SOCs) are the first-line of defence in an organisation, providing 24/7 monitoring, detection, and response to security attacks. This thesis aims to explore the challenges in malware detection in Security Operation Centres (SOCs) providing recommendations for possible technological solutions. We first start by investigating the workflow SOC practitioners follow. ...
open access articleRansomware is a type of advanced malware that has spread rapidly in recent years,...
Over recent decades, we have moved our workflows, record management, and communications into digital...
Bots are computer programs that perform tasks with some degree of autonomy. Bots can be used for mal...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
Malware is software code that has malicious intent. In recent years, there have beenhuge changes in ...
Sophisticated software with malicious intentions (malware) that can easily and aggressively spread t...
In May 2017, a global ransomware campaign adversely affected approximately 48 UK hospitals. Response...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Downloading software from unknown sources constitutes a great risk. Studies have described file-shar...
thesisSecurity professionals are in constant battle with the recent trend of sophisticated malware t...
Malware continues to be one of the primary tools employed by attackers. It is used in attacks rangin...
Malware is defined as any code that intentionally disrupts normal computer operation. The best-known...
Microservice-based architecture is a relatively new paradigm of software development that has gained...
open access articleRansomware is a type of advanced malware that has spread rapidly in recent years,...
Over recent decades, we have moved our workflows, record management, and communications into digital...
Bots are computer programs that perform tasks with some degree of autonomy. Bots can be used for mal...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
Malware is software code that has malicious intent. In recent years, there have beenhuge changes in ...
Sophisticated software with malicious intentions (malware) that can easily and aggressively spread t...
In May 2017, a global ransomware campaign adversely affected approximately 48 UK hospitals. Response...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Downloading software from unknown sources constitutes a great risk. Studies have described file-shar...
thesisSecurity professionals are in constant battle with the recent trend of sophisticated malware t...
Malware continues to be one of the primary tools employed by attackers. It is used in attacks rangin...
Malware is defined as any code that intentionally disrupts normal computer operation. The best-known...
Microservice-based architecture is a relatively new paradigm of software development that has gained...
open access articleRansomware is a type of advanced malware that has spread rapidly in recent years,...
Over recent decades, we have moved our workflows, record management, and communications into digital...
Bots are computer programs that perform tasks with some degree of autonomy. Bots can be used for mal...