© 2017 ACM. This study exposes a serious and rapidly growing cyber threat of compromised legitimate user credentials which is very effective for cyber-criminals to gain trusted relationships with the account owners. Such a compromised user\u27s credentials ultimately result in damage incurred by the attacker at large-scale. Moreover, the detection of compromised legitimate user activities is crucial in competitive and sensitive organizations because wrong data is more difficult to clean from the database. The proposed study presents a novel approach to detect compromised users\u27 activity in a live database. Our approach uses a composition of prudence analysis, ripple down rules (RDR) and simulated experts (SE) to detect and identify accou...
© 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how t...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...
© Springer Science+Business Media New York 2018. Compromised user credential (CUC) is an activity in...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
This paper investigates the effect of common network attacks on the performance, and security of sev...
Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security def...
Today it is known that the weakest link in the cyber security chain is the computer user. Social eng...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
© 2020 John Wiley & Sons, Ltd Malware analysis and detection over the Android have been the focus of...
Understanding the natural human behavior when people interact with Web browsers is essential for bui...
This chapter presents the central theme and a big picture of the methods and technologies covered in...
Spear phishing emails pose great danger to employees of organizations due to the inherent weakness o...
© 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how t...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...
© Springer Science+Business Media New York 2018. Compromised user credential (CUC) is an activity in...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
This paper investigates the effect of common network attacks on the performance, and security of sev...
Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security def...
Today it is known that the weakest link in the cyber security chain is the computer user. Social eng...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
© 2020 John Wiley & Sons, Ltd Malware analysis and detection over the Android have been the focus of...
Understanding the natural human behavior when people interact with Web browsers is essential for bui...
This chapter presents the central theme and a big picture of the methods and technologies covered in...
Spear phishing emails pose great danger to employees of organizations due to the inherent weakness o...
© 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how t...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...