Results 121 to 130 of about 1,936 (160)

Transfer learning with XAI for robust malware and IoT network security. [PDF]

open access: yesSci Rep
Almadhor A   +6 more
europepmc   +1 more source

Assessment of cybersecurity awareness among healthcare professionals. A cross sectional study. [PDF]

open access: yesJ Educ Health Promot
Moothedath M   +5 more
europepmc   +1 more source

Toward security-aware portable sequencing. [PDF]

open access: yesNat Commun
Stillman C   +3 more
europepmc   +1 more source

Autonomous Ransomware Detection through Deep Ransomware Fingerprint Mapping

open access: yes
Joseph Briser   +4 more
openaire   +1 more source

Ransomware

2009
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it
Xin Luo, Qinyu Liao
openaire   +1 more source

Ransomware

2021
SWP-Aktuell 56 ...
Schulze, Matthias   +1 more
openaire   +2 more sources

Ransomware Evolution: Solving Ransomware Attack Challenges

2020
This research focuses on the world’s most frightening cybersecurity threat known as Ransomware. Ransomware is popularly described by experts as scareware that makes data and resources on a victims’ computer inaccessible and forces the victims to pay a ransom with bitcoins or through other means by frightening and intimidating them.
Muhammad Ubale Kiru, Aman Jantan
openaire   +1 more source

Home - About - Disclaimer - Privacy