- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources1
- Resource Type
-
0001000000000000
- More
- Availability
-
10
- Author / Contributor
- Filter by Author / Creator
-
-
Heymann, Elisa (1)
-
Lacalle, Ignacio (1)
-
MartÃnez, José (1)
-
Miller, Barton (1)
-
Palau, Carlos (1)
-
Reinosa, Raul (1)
-
Valero, Clara (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
& Andrews-Larson, C. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
In recent years, ransomware has established itself as one of the most persistent and devastating threats in cybersecurity. Traditionally, these attacks have focused on data at rest, encrypting files and demanding a ransom for their recovery. However, an alarming trend has emerged: ransomware for attacks to data in motion. This data, which includes information transmitted over networks, is critical to the day-to-day operations of organizations and often receives less protection than stored data. This paper aims to explore and characterize these new ransomware threats for attacks to data in motion. It also aims to test the feasibility of these attacks through the creation and implementation of a laboratory environment, as well as to analyze the potential consequences (based on likelihood and impact assessments) of such attacks if they were to be carried out, providing a comprehensive view of the potential emerging risks and warning of the need to create tools for the prevention, detection and mitigation of these attacks.more » « less
An official website of the United States government

Full Text Available