Blockchain Technology: Local Government Applications and Challenges
This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in […]
This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in […]
If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the […]
Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, […]
Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source […]
IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting […]
Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly encountering ransomware attacks resulting in significant network downtime, […]
TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June […]
How to model and encode the semantics of human-written text and select the type of neural network to process it […]
This draft white paper identifies seventeen technical trust-related issues that may negatively impact the adoption of IoT products and services. […]