Results 121 to 130 of about 1,936 (160)
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source
Assessment of cybersecurity awareness among healthcare professionals. A cross sectional study. [PDF]
Moothedath M +5 more
europepmc +1 more source
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring. [PDF]
Gómez-Hernández JA, García-Teodoro P.
europepmc +1 more source
Toward security-aware portable sequencing. [PDF]
Stillman C +3 more
europepmc +1 more source
Securing the Future of Railway Systems: A Comprehensive Cybersecurity Strategy for Critical On-Board and Track-Side Infrastructure. [PDF]
Ibadah N, Benavente-Peces C, Pahl MO.
europepmc +1 more source
Autonomous Ransomware Detection through Deep Ransomware Fingerprint Mapping
Joseph Briser +4 more
openaire +1 more source
Ransomware Attacks, ED Visits and Inpatient Admissions in Targeted and Nearby Hospitals.
Abouk R, Powell D.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2009
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it
Xin Luo, Qinyu Liao
openaire +1 more source
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it
Xin Luo, Qinyu Liao
openaire +1 more source
Ransomware Evolution: Solving Ransomware Attack Challenges
2020This research focuses on the world’s most frightening cybersecurity threat known as Ransomware. Ransomware is popularly described by experts as scareware that makes data and resources on a victims’ computer inaccessible and forces the victims to pay a ransom with bitcoins or through other means by frightening and intimidating them.
Muhammad Ubale Kiru, Aman Jantan
openaire +1 more source

