3 results

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

Journal Article
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022)
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enter...

Browsers’ Private Mode: Is It What We Were Promised?

Journal Article
Hughes, K., Papadopoulos, P., Pitropakis, N., Smales, A., Ahmad, J., & Buchanan, W. J. (2021)
Browsers’ Private Mode: Is It What We Were Promised?. Computers, 10(12), Article 165. https://doi.org/10.3390/computers10120165
Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine ...