Malware hash cloud
Nowadays, any system on the internet can be a target of cyber-attacks. Many of these attacks, including malware installation, have some specific indicators designated IOCs (Indicators of Compromise) that can be used to detect the same attack on other systems (e.g., hash of a malicious file). The obj...
Autor principal: | |
---|---|
Outros Autores: | , |
Formato: | conferenceObject |
Idioma: | eng |
Publicado em: |
2022
|
Assuntos: | |
Texto completo: | http://hdl.handle.net/10198/25802 |
País: | Portugal |
Oai: | oai:bibliotecadigital.ipb.pt:10198/25802 |