Multiple works have leveraged the public Bitcoin ledger to estimate the
...
Many studies have proposed machine-learning (ML) models for malware dete...
Previous work has investigated the particularities of security practices...
Online scanners analyze user-submitted files with a large number of secu...
To adapt to a constantly evolving landscape of cyber threats, organizati...
Cybercriminals often leverage Bitcoin for their illicit activities. In t...
Malware abuses TLS to encrypt its malicious traffic, preventing examinat...
Identifying threats in a network traffic flow which is encrypted is uniq...
Android is the most popular operating system with billions of active dev...
Tags can be used by malware repositories and analysis services to enable...
Binary code similarity approaches compare two or more pieces of binary c...
In a Cross-Origin State Inference (COSI) attack, an attacker convinces a...
During the last decades, the problem of malicious and unwanted software
...