Unmasking the hidden credential leaks in password managers and VPN clients DOI Creative Commons
Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104298 - 104298

Published: Dec. 1, 2024

Language: Английский

TinyIDS - An IoT Intrusion Detection System by Tiny Machine Learning DOI
Pietro Fusco,

Gennaro Pio Rimoli,

Massimo Ficco

et al.

Lecture notes in computer science, Journal Year: 2024, Volume and Issue: unknown, P. 71 - 82

Published: Jan. 1, 2024

Language: Английский

Citations

4

LM-Hunter: An NLP-Powered Graph Method for Detecting Adversary Lateral Movements in APT Cyber-Attacks at Scale DOI
Mario Pérez-Gomariz, Fernando Cerdán,

Jess García

et al.

Computer Networks, Journal Year: 2025, Volume and Issue: unknown, P. 111181 - 111181

Published: March 1, 2025

Language: Английский

Citations

0

Blockchain in Cybersecurity DOI
Akhil John Mampilly, Vijaya Kittu Manda,

Chithirai Pon Selvan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 49 - 88

Published: Oct. 4, 2024

Blockchain is a promising technology that can help organizations improve their cybersecurity. has many inherent features enhance data security, threat detection and response, strengthen authentication authorization, cyber intelligence sharing. This possible because of the innovative approach uses, such as immutable ledgers to store transactions, monitor assets, build trust by providing access only authorized participants. The chapter discusses cybersecurity best practices related smart contracts, key management, network user education awareness, incident reporting, privacy challenges, software updates, decentralization. Key regulatory compliance aspects, GDPR HIPPA, are discussed. increasing interactions Artificial Intelligence (AI), Machine Learning (ML), Internet Things (IoT) with further provide improved services hence form discussion trends potential future research section this chapter.

Language: Английский

Citations

3

Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection DOI

Hongle Liu,

Ming Liu, Lansheng Han

et al.

Computers & Security, Journal Year: 2025, Volume and Issue: unknown, P. 104387 - 104387

Published: March 1, 2025

Language: Английский

Citations

0

Assessing the detection of lateral movement through unsupervised learning techniques DOI
Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: 149, P. 104190 - 104190

Published: Nov. 6, 2024

Language: Английский

Citations

1

A step-by-step definition of a reference architecture for cyber ranges DOI Creative Commons
Vyron Kampourakis, Vasileios Gkioulos, Sokratis Katsikas

et al.

Journal of Information Security and Applications, Journal Year: 2024, Volume and Issue: 88, P. 103917 - 103917

Published: Nov. 21, 2024

Language: Английский

Citations

1

Unmasking the hidden credential leaks in password managers and VPN clients DOI Creative Commons
Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104298 - 104298

Published: Dec. 1, 2024

Language: Английский

Citations

0