DTRAP and ACM are committed to hearing from practitioners. To that end, DTRAP has created a paper called a Field Note, which is in essence a...
Continue reading...Extended Call for Papers!
Extended Call For Papers ACM Digital Threats: Research and Practice (DTRAP) Special Issue on Memory-based malware and other unconventional threats A.k.a. “These are not your grandpa’s...
Continue reading...Special Issue on Memory-based Malware and other Unconventional Threats
AKA: These aren’t your grandpa’s malware. Guest Editors:• Marcus Botacin, Federal University of Paraná (UFPR), Brazil• Ruimin Sun, Northeastern University (NEU), USA• Uriel Kosayev, Antivirus Bypass...
Continue reading...Offensive! Machine Learning
In 2019, some cybercriminals used Machine Learning to steal money from a company. They did it by mimicking the voice of an executive in a phone...
Continue reading...No Pie Charts without Pie
Pie charts are popular in newspapers, in magazines, and yes, even in presentations. This post is going to talk about why you should avoid pie charts...
Continue reading...DDOS, Defense, and… Research
In my days in industry, I used to deal with the occasional DDOS. I was even woken up by them. Our Network Management System would think...
Continue reading...Mean vs Median — Cage Match
This is another one of those blog posts that I hope will help you do research, it’s not necessarily about DTRAP. It’s also not directly about...
Continue reading...Writing Reviews — Revisited
I’ve written before about writing a review and there’s even guidelines on the DTRAP website. I wanted to revisit the topic because I think it’s useful....
Continue reading...Erecting a DTRAP Column
Unlike most academic journals, DTRAP has two columns. This blog post is to talk about those columns and hopefully inspire you (my reader) to write one....
Continue reading...Writing a Review
The first time I reviewed a paper, I felt like I was back in school again. There was a timer, a proctor, a paragraph I had...
Continue reading...