Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2023
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 4Article No.: 54, Pages 1–23https://doi.org/10.1145/3568993Network-based attacks and their mitigation are of increasing importance in our ever-connected world. Often network-based attacks address valuable data, which the attacker either encrypts to extort ransom or steals to make money reselling, or both. After ...
On collaborative predictive blacklisting
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 48, Issue 5Pages 9–20https://doi.org/10.1145/3310165.3310168Collaborative predictive blacklisting (CPB) allows to forecast future attack sources based on logs and alerts contributed by multiple organizations. Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks ...
- research-articleAugust 2009
Goal-oriented security threat mitigation patterns: a case of credit card theft mitigation
PLoP '09: Proceedings of the 16th Conference on Pattern Languages of ProgramsArticle No.: 17, Pages 1–15https://doi.org/10.1145/1943226.1943247Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that it is difficult to possess necessary broad and deep knowledge of security related strategic knowledge to choose mitigating solutions ...
- research-articleJanuary 2008
Combating the Insider Cyber Threat
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 6, Issue 1Pages 61–64https://doi.org/10.1109/MSP.2008.8Organizations must implement effective training to raise staff awareness about insider threats and the need for organizations to adopt a more effective approach to identifying potential risks and then taking proactive steps to mitigate them.