Analysis and Detection of the Silent Thieves

<p> As the cryptocurrency market becomes more lucrative and accessible, cybercriminals will continue to adapt strategies to monetize the unauthorized use of system resources for mining operations. Some of these strategies involve infecting systems with malware that will deploy a cryptomining a...

Full description

Bibliographic Details
Main Author: Perez, Jon
Language:EN
Published: Utica College 2018
Subjects:
Online Access:http://pqdtopen.proquest.com/#viewpdf?dispub=10931156