Said Varlioglu
YOU?
Author Swipe
View article: The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts
The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts Open
Fileless malware predominantly relies on PowerShell scripts, leveraging the native capabilities of Windows systems to execute stealthy attacks that leave no traces on the victim's system. The effectiveness of the fileless method lies in it…
View article: Exploring the Journey to Drug Overdose: Applying the Journey to Crime Framework to Drug Sales Locations and Overdose Death Locations
Exploring the Journey to Drug Overdose: Applying the Journey to Crime Framework to Drug Sales Locations and Overdose Death Locations Open
Drug overdose is a pressing public health concern in the United States, resulting in a significant number of fatalities each year. In this study, we employ the Journey to Crime (JTC) framework borrowed from the field of environmental crimi…
View article: The Dangerous Combo: Fileless Malware and Cryptojacking
The Dangerous Combo: Fileless Malware and Cryptojacking Open
Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount o…
View article: Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models
Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models Open
Previous studies have offered a variety of explanations on the relationship between democracy and the internet. However, most of these studies concentrate on regions, specific states or authoritarian regimes. No study has investigated the …
View article: Plunge into the Underworld: A Survey on Emergence of Darknet
Plunge into the Underworld: A Survey on Emergence of Darknet Open
The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can …
View article: A Prevention and a Traction System for Ransomware Attacks
A Prevention and a Traction System for Ransomware Attacks Open
Over the past three years, especially following WannaCry malware, ransomware\nhas become one of the biggest concerns for private businesses, state, and local\ngovernment agencies. According to Homeland Security statistics, 1.5 million\nran…