- 博客(6)
- 收藏
- 关注
翻译 如何利用事故响应计划
Learning how to utilize an incident plan to prepare an organization to respond to cyber-attacks including phishing, ransomware, and wire fraud attempts is crucial for any organization. 学习如何利用事件计划来使组织做...
2020-09-07 11:37:37 313
翻译 二阶sql注入里面隐藏了一些东西
Summary : 总结: Everyone knows what is SQL Injection, but just to give you a brief about SQL Injection, it is a code injection technique that might destroy your database. It usually occurs when you ask...
2020-09-07 11:26:51 456
翻译 数据数据泄露泄露_数据泄露的代价
数据数据泄露泄露The IBM Security “Cost of a Data breach” survey is out [here], and it analyses the ever-increasing costs involved in data breaches. It involves a survey of 524 companies who have recently had ...
2020-09-05 02:43:00 264
翻译 加密病毒的功能
Cybercriminals use encrypted ransomware that has become the most common type because it is difficult to crack the encryption and remove the malware. All the stuff you keep on your PC is encrypted by m...
2020-09-05 02:32:47 305
翻译 基于深度学习lstm_基于LSTM的深度恶意软件分析
基于深度学习lstmMalware development has seen diversity in terms of architecture and features. This advancement in the competencies of malware poses a severe threat and opens new research dimensions in malwa...
2020-09-05 02:22:25 1164
翻译 主动秘密共享
SSS简介 (Intro to SSS) Before we talk about Proactive Secret Sharing, we probably should briefly talk about Secret Sharing, in particular, we want to focus on Shamir Secret Sharing (SSS). 在谈论主动秘密共享之前,我...
2020-09-05 02:12:19 698
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人