Skip to main content

Showing 1–2 of 2 results for author: Petraityte, M

Searching in archive cs. Search in all archives.
.
  1. A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies

    Authors: Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou

    Abstract: Various researchers have shown that the Common Vulnerability Scoring System (CVSS) has many drawbacks and may not provide a precise view of the risks related to software vulnerabilities. However, many threat intelligence platforms and industry-wide standards are relying on CVSS score to evaluate cybersecurity compliance. This paper suggests several improvements to the calculation of Impact and Exp… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: 19 Pages

  2. arXiv:1706.08048  [pdf

    cs.CR

    Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors

    Authors: Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou

    Abstract: This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how mobile users respond to social engineering attacks conducted via mobile devices. The results of this experiment outline a guided mobile phone forensics investigation method which could facilitate the work of digital forensics investigators while analysing the data from mobile devices. The behavioural… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

    Journal ref: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Pages 79-89,Chapter 6, 2017