2   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos    
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Octavian Grigorescu, Andreea Nica, Mihai Dascalu and Razvan Rughinis    
Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has emerged as a means to prevent and fight cybercrime. Attempts already exist in this regard. The Commo... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »