Attacks such as spamming, distributed denial of service and phishing have become commonplace on the Internet. In the past, attackers would use high bandwidth Internet connection servers to accomplish their tasks. Since desktop users today have high-speed Internet connections, attackers infect users’ desktops and harness their computing power to perform malicious activities over the Internet. As attackers develop new methods to attack from distributed locations as well as avoid being detected, there is a need to develop efficient methods to detect and mitigate this epidemic of infection of hosts on the network. In this project, we aim to analyze the peer-to-peer botnet binary known as ...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Detection of phishing emails is a topic that has received a lot of attention both from academia and ...
With the rapid explosion of Internet of Things (IoT), IoT enabled devices have reached every corner ...
In recent years, botnets have emerged as a serious threat on the Internet. Botnets are commonly used...
Botnets are a significant threat to computer networks and data stored on networked computers. The ab...
Since the early days of information technology, there have been many stakeholders who used the techn...
Many applications have used machine learning as a tool to detect malware. These applications take i...
An Ad hoc wireless network has no infrastructure. It is formed dynamically by a group of moving node...
Dissertation (Ph.D.) University of Alaska Fairbanks, 2012The internet has brought about tremendous c...
Mobile ad-hoc networks (MANETs) are susceptible to security attacks due to their limited resources a...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
With the increased ease in cloud deployment platforms, web applications have become an easy target f...
This paper explores how existing push notification based two-factor authentication systems are susce...
The substantial proliferation of the Internet has made it the most critical infrastructure in today\...
Phishing is one of the most potentially disruptive actions that can be performed on the Internet. In...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Detection of phishing emails is a topic that has received a lot of attention both from academia and ...
With the rapid explosion of Internet of Things (IoT), IoT enabled devices have reached every corner ...
In recent years, botnets have emerged as a serious threat on the Internet. Botnets are commonly used...
Botnets are a significant threat to computer networks and data stored on networked computers. The ab...
Since the early days of information technology, there have been many stakeholders who used the techn...
Many applications have used machine learning as a tool to detect malware. These applications take i...
An Ad hoc wireless network has no infrastructure. It is formed dynamically by a group of moving node...
Dissertation (Ph.D.) University of Alaska Fairbanks, 2012The internet has brought about tremendous c...
Mobile ad-hoc networks (MANETs) are susceptible to security attacks due to their limited resources a...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
With the increased ease in cloud deployment platforms, web applications have become an easy target f...
This paper explores how existing push notification based two-factor authentication systems are susce...
The substantial proliferation of the Internet has made it the most critical infrastructure in today\...
Phishing is one of the most potentially disruptive actions that can be performed on the Internet. In...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Detection of phishing emails is a topic that has received a lot of attention both from academia and ...
With the rapid explosion of Internet of Things (IoT), IoT enabled devices have reached every corner ...