Analysis and Detection of the Silent Thieves
<p> As the cryptocurrency market becomes more lucrative and accessible, cybercriminals will continue to adapt strategies to monetize the unauthorized use of system resources for mining operations. Some of these strategies involve infecting systems with malware that will deploy a cryptomining a...
Main Author: | |
---|---|
Language: | EN |
Published: |
Utica College
2018
|
Subjects: | |
Online Access: | http://pqdtopen.proquest.com/#viewpdf?dispub=10931156 |