2022
DOI: 10.12688/f1000research.109148.3
|View full text |Cite
|
Sign up to set email alerts
|

Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework

Abstract: Background: Microsoft Windows Security is a recently implemented safeguard for the Windows operating systems, including the latest versions of Windows10 and 11. However, there is a major shortcoming in this system to stop Advanced Persistent Threat (APT). These are government-financed groups that are funded to attack other government entities. Following the initial security breach, the hacked Windows device is used to access the rest of the network devices in order to transfer data to external storage (Exfiltr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Historically, the rudimentary applications of this confluence were discernible in the use of hand gestures for smartphones or tablets, a domain that has since witnessed radical metamorphosis. 14,18,[23][24][25][26][28][29][30][31][32]34,35,[37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52][53] The contemporary landscape sees gesture control permeating environments as expansive as desktops, where intricate hand movements can seamlessly manage presentations or navigate through web interfaces. 38,39 At a granular level, the progression of gesture control traverses two salient trajectories: the deployment of specialized hardware and the adoption of software-centric solutions.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Historically, the rudimentary applications of this confluence were discernible in the use of hand gestures for smartphones or tablets, a domain that has since witnessed radical metamorphosis. 14,18,[23][24][25][26][28][29][30][31][32]34,35,[37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52][53] The contemporary landscape sees gesture control permeating environments as expansive as desktops, where intricate hand movements can seamlessly manage presentations or navigate through web interfaces. 38,39 At a granular level, the progression of gesture control traverses two salient trajectories: the deployment of specialized hardware and the adoption of software-centric solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Real-time gesture interpretations in these platforms magnify user immersion, enabling an unprecedented interaction level with virtual realms. 14,18,[23][24][25][26][28][29][30][31][32]34,35,[44][45][46][47][48][49][50][51][52][53][54]56,57 On the hardware front, devices such as the Leap Motion controller and the Myo armband are exemplary testaments to the future of gesture control. These devices, empowered by AI, meticulously interpret intricate hand gestures and muscle movements, offering a plethora of command capabilities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They have also identified several potential benefits, such as enhanced decisionmaking capabilities, higher efficiency, and increased reliability [27]. They have also determined that there is a requirement for ongoing investments in cybersecurity to guarantee the safe and secure implementation of these technologies inside the power sector [28]. In conclusion, the review of the relevant literature reveals that there is an expanding body of research on AI and cybersecurity in the power sector, with a focus on the most significant threats and challenges, the development of new solutions and technologies, as well as the future trends and opportunities in the field.…”
Section: ░ 3 Literature Reviewmentioning
confidence: 99%