2020
DOI: 10.1007/978-3-030-39512-4_53
|View full text |Cite
|
Sign up to set email alerts
|

Distinguishing a Human or Machine Cyberattacker

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…www.ijacsa.thesai.org The average MLD values, emerging from the translation into one of the available languages and then back to English for each of the test sentences, are provided in Table IV. The sources for the quotations can be found at [8]. This examination is intended to ascertain the cyberattack's original source language.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…www.ijacsa.thesai.org The average MLD values, emerging from the translation into one of the available languages and then back to English for each of the test sentences, are provided in Table IV. The sources for the quotations can be found at [8]. This examination is intended to ascertain the cyberattack's original source language.…”
Section: Methodsmentioning
confidence: 99%
“…In previous studies [7,8], we have analyzed ransomware external messaging via a mechanism that has involved six extensively used languages (French, Spanish, German, Russian, Chinese, and Hindi) and several round-trip translation (RTT) operations from target language into English using the Google Translate (GT) functionality. Our analysis was then conducted on a number of random quotations from popular culture and English literature and that finally allowed us to devise a procedure which could establish whether a perceived attack was initiated by a human writer with some knowledge of English, or alternatively, by a machine translation.…”
Section: Scope Of Researchmentioning
confidence: 99%
See 3 more Smart Citations