Malware hash cloud

Nowadays, any system on the internet can be a target of cyber-attacks. Many of these attacks, including malware installation, have some specific indicators designated IOCs (Indicators of Compromise) that can be used to detect the same attack on other systems (e.g., hash of a malicious file). The obj...

ver descrição completa

Detalhes bibliográficos
Autor principal: Ferreira, Paulo (author)
Outros Autores: Gonçalo, Rui (author), Pedrosa, Tiago (author)
Formato: conferenceObject
Idioma:eng
Publicado em: 2022
Assuntos:
Texto completo:http://hdl.handle.net/10198/25802
País:Portugal
Oai:oai:bibliotecadigital.ipb.pt:10198/25802