Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 33.

Add to Quick Collection   All 33 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1215462
Description: The continued rapid growth of the Internet and the emergence of the Internet of Things (IoT) have resulted in the increased sophistication of malicious software or crime-ware tools and the refinement ... More
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1196335
Description: With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations re ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1051988
Description: Broadcast authentication is a fundamental security service in wireless sensor networks (WSNs). Although symmetric-key-based μTESLA-like schemes were employed due to their energy efficiency, they all s ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1051967
Description: Malware replicates itself and produces offspring with the same characteristics but different signatures by using code obfuscation techniques. Current generation Anti-Virus (AV) engines employ a signat ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1217778
Description: The continued growth of the Internet has resulted in the increasing sophistication of toolkit and methods to conduct computer attacks and intrusions that are easy to use and publicly available to down ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1195933
Description: The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new te ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1051727
Description: In the crimeware world, financial botnets are a global threat to banking organizations. Such malware purposely performs financial fraud and steals critical information from clients' computers. A commo ... More
Reviewed: Reviewed
Authors: Alazab, Mamoun
Date: 2015
Subject Keyword: Cybercrime | Malware | Profiling
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/358966
Description: Malware is a major security threat confronting computer systems and networks and has increased in scale and impact from the early days of ICT. Traditional protection mechanisms are largely incapable o ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1049749
Description: 18 page(s)
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1041192
Description: This paper presents an efficient and novel approach for malware detection. The proposed approach uses a hybrid wrapper-filter model for malware feature selection, which combines Maximum Relevance (MR) ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/358967
Description: The Internet is a decentralized structure that offers speedy communication, has a global reach and provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with t ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/358972
Description: Cybercrime continues to be a growing challenge and malware is one of the most serious security threats on the Internet today which have been in existence from the very early days. Cyber criminals cont ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/358982
Description: This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber crime, theoretical and empirical challenges in addressing what is known about cyb ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1044272
Description: Improving the efficiency, effectiveness, and quality of public services has become a growing concern for many governments across the world, and more so with recent popularity of online services, widel ... More
Date: 2014
Subject Keyword: Network | Skype | VoIP | Security | Machine learning
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/358917
Description: Voice over IP (VoIP) technologies such as Skype are becoming increasingly popular and widely used in different organisations, and therefore identifying the usage of this service at the network level b ... More
Reviewed: Reviewed