Data Loss Prevention is a technique that allows to identify, monitor, and protect data in motion, in use and at rest. Ransomware is a type of malware and being infected with it is one of the biggest risks for an enterprise. The function of ransomware is to encrypt files and then ask the victim for a ransom. Ransomwares currently in use, offered under the Ransomware-as-a-Service (RaaS) model, can be configured to exfiltrate data and doubly extort victims with the integrity and confidentiality of the attacked data. This pattern increases the number of attacks because attackers don't need to have the technical knowledge to launch these attacks. In this thesis, Data Loss Prevention (DLP) issue in a public cloud environment for an enterprise is ...
This study investigated the utilization of memory forensics and the Large Language Model LLaMA-7B fo...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Cloud computing is a vast system which provides service based on usage to any number of users from a...
Data Loss Prevention is a technique that allows to identify, monitor, and protect data in motion, in...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal ...
Abstract: Distributed Denial of Service (DDoS) attack launched in Cloud computing environment result...
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
International audienceWe present the Malware - O - Matic analysis platform and the Data Aware Defens...
This master's thesis seeks to design, implement, and point out new techniques for obfuscation of ran...
Cloud computing promises to significantly change the way we use computers and access and store our p...
This study proposes a decision model for Data Security Strategy supporting risk management of ransom...
Cloud data sent from the person is attacked, leading to data hacking. Data classification can be mad...
Ransomware (RW) is a real threat affecting almost every sector including, government agencies, busin...
The threat from ransomware continues to grow both in the number of affected victims as well as the c...
This study investigated the utilization of memory forensics and the Large Language Model LLaMA-7B fo...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Cloud computing is a vast system which provides service based on usage to any number of users from a...
Data Loss Prevention is a technique that allows to identify, monitor, and protect data in motion, in...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal ...
Abstract: Distributed Denial of Service (DDoS) attack launched in Cloud computing environment result...
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
International audienceWe present the Malware - O - Matic analysis platform and the Data Aware Defens...
This master's thesis seeks to design, implement, and point out new techniques for obfuscation of ran...
Cloud computing promises to significantly change the way we use computers and access and store our p...
This study proposes a decision model for Data Security Strategy supporting risk management of ransom...
Cloud data sent from the person is attacked, leading to data hacking. Data classification can be mad...
Ransomware (RW) is a real threat affecting almost every sector including, government agencies, busin...
The threat from ransomware continues to grow both in the number of affected victims as well as the c...
This study investigated the utilization of memory forensics and the Large Language Model LLaMA-7B fo...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Cloud computing is a vast system which provides service based on usage to any number of users from a...