Results 1 to 10 of about 21,539 (179)

Ransomware and reputation [PDF]

open access: yesGames, 2019
open access articleRansomware is a particular form of cyber-attack in which a victim loses access to either his electronic device or files unless he pays a ransom to criminals.
Anna Cartwright   +8 more
core   +6 more sources

A Machine Learning-Based Ransomware Detection Method for Attackers’ Neutralization Techniques Using Format-Preserving Encryption [PDF]

open access: yesSensors
Ransomware, a type of malware that first appeared in 1989, encrypts user files and demands money for decryption, causing increasing global damage. To reduce the impact of ransomware, various file-based detection technologies are being developed; however,
Jaehyuk Lee   +3 more
doaj   +2 more sources

On the classification of Microsoft-Windows ransomware using hardware profile [PDF]

open access: yesPeerJ Computer Science, 2021
Due to the expeditious inclination of online services usage, the incidents of ransomware proliferation being reported are on the rise. Ransomware is a more hazardous threat than other malware as the victim of ransomware cannot regain access to the ...
Sana Aurangzeb   +4 more
doaj   +2 more sources

KRDroid: Ransomware-Oriented Detector for Mobile Devices Based on Behaviors

open access: yesApplied Sciences, 2021
Ransomware has become a serious threat on Android and new cases of ransomware are continuously growing. Most existing ransomware detectors use sensitive text or APIs to detect ransomware.
Senmiao Wang   +6 more
doaj   +1 more source

Ransomware Detection Using Machine Learning: A Survey

open access: yesBig Data and Cognitive Computing, 2023
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ...
Amjad Alraizza, Abdulmohsen Algarni
doaj   +1 more source

Detection of Ransomware Attacks Using Processor and Disk Usage Data

open access: yesIEEE Access, 2023
Ransomware often evades antivirus tools, encrypts files, and renders the target computer and its data unusable. The current approaches to detect such ransomware include monitoring processes, system calls, and file activities on the target system and ...
Kumar Thummapudi   +2 more
doaj   +1 more source

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

open access: yesIEEE Access, 2022
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.
Fatimah Aldauiji   +2 more
doaj   +1 more source

The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models

open access: yesInformation, 2023
Several supervised machine learning models have been proposed and used to detect Android ransomware. These models were trained using different datasets from different sources.
Qussai M. Yaseen
doaj   +1 more source

A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms

open access: yesEntropy, 2022
Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus prompting the study
Jaehyuk Lee, Kyungroul Lee
doaj   +1 more source

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions

open access: yesIEEE Access, 2023
The proliferation of ransomware has become a significant threat to cybersecurity in recent years, causing significant financial, reputational, and operational damage to individuals and organizations. This paper aims to provide a comprehensive overview of
Salwa Razaulla   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy