Visitors   Views   Downloads

Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat

View preprint
RT @PeerJCompSci: New Preprint: "Disguised exe files in spear-phishing emails: Detecting the point of entry in adv. persistent threat" http…
New Preprint: "Disguised exe files in spear-phishing emails: Detecting the point of entry in adv. persistent threat" https://t.co/tO6gE81Jmd
NOT PEER-REVIEWED
"PeerJ Preprints" is a venue for early communication or feedback before peer review. Data may be preliminary.
A newer version of this Preprint is available: View the latest version

Additional Information

Competing Interests

The authors declare that they have no competing interests.

Author Contributions

Ibrahim Ghafir conceived and designed the experiments, performed the experiments, analyzed the data, contributed reagents/materials/analysis tools, wrote the paper, prepared figures and/or tables, performed the computation work, reviewed drafts of the paper.

Mohammad Hammoudeh reviewed drafts of the paper.

Vaclav Prenosil reviewed drafts of the paper.

Data Deposition

The following information was supplied regarding data availability:

The raw data/code is included in the manuscript, in Section 3.

Funding

The authors received no funding for this work.


Add your feedback

Before adding feedback, consider if it can be asked as a question instead, and if so then use the Question tab. Pointing out typos is fine, but authors are encouraged to accept only substantially helpful feedback.

Some Markdown syntax is allowed: _italic_ **bold** ^superscript^ ~subscript~ %%blockquote%% [link text](link URL)
 
By posting this you agree to PeerJ's commenting policies