Malware hash cloud

Nowadays, any system on the internet can be a target of cyber-attacks. Many of these attacks, including malware installation, have some specific indicators designated IOCs (Indicators of Compromise) that can be used to detect the same attack on other systems (e.g., hash of a malicious file). The obj...

Full description

Bibliographic Details
Main Author: Ferreira, Paulo (author)
Other Authors: Gonçalo, Rui (author), Pedrosa, Tiago (author)
Format: conferenceObject
Language:eng
Published: 2022
Subjects:
Online Access:http://hdl.handle.net/10198/25802
Country:Portugal
Oai:oai:bibliotecadigital.ipb.pt:10198/25802