Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para o cumprimento do programa de Pós-Doutoramento em Ciências da InformaçãoOur cyber space is quickly becoming over-whelmed with ever-evolving malware that breaches all security defenses, works viciously in the background without user awareness or interaction, and secretly leaks of confidential business data. One of the most pressing challenges faced by business organizations when they experience a cyber-attack is that, more often than not, those organizations do not have the knowledge nor readiness of how to analyze malware once it has been discovered on their production computer networks. The objective of this six months post-doctoral project is to present the...
With the meteoric rise in popularity of the Android platform, there is an urgent need to combat the ...
Detecting network intruders and malicious software is a significant problem for network administrato...
Vulnerabilities in software, whether they be malicious or benign are a major concern in every sector...
This project examines the protection methods suggested by hackers to guard against online victimizat...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
A survey paper on the cyber crime which effected so many digital systems as we are very much dependi...
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es deci...
The conceptions of warfare and battlefield have astonishingly evolved, going from a traditional view...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary ...
The purpose of this study is to explore how current digital curation and archives and records manage...
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a sma...
After more than four decades email is still the most widely used electronic communication medium tod...
The Android platform is the fastest growing smartphone operating system to date. Consequently, malwa...
Malware attacks are a significant and frequently reported problem, adversely affecting the productivit...
With the meteoric rise in popularity of the Android platform, there is an urgent need to combat the ...
Detecting network intruders and malicious software is a significant problem for network administrato...
Vulnerabilities in software, whether they be malicious or benign are a major concern in every sector...
This project examines the protection methods suggested by hackers to guard against online victimizat...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
A survey paper on the cyber crime which effected so many digital systems as we are very much dependi...
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es deci...
The conceptions of warfare and battlefield have astonishingly evolved, going from a traditional view...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary ...
The purpose of this study is to explore how current digital curation and archives and records manage...
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a sma...
After more than four decades email is still the most widely used electronic communication medium tod...
The Android platform is the fastest growing smartphone operating system to date. Consequently, malwa...
Malware attacks are a significant and frequently reported problem, adversely affecting the productivit...
With the meteoric rise in popularity of the Android platform, there is an urgent need to combat the ...
Detecting network intruders and malicious software is a significant problem for network administrato...
Vulnerabilities in software, whether they be malicious or benign are a major concern in every sector...