Results 151 to 160 of about 21,893 (200)
Some of the next articles are maybe not open access.
2009
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it
Xin Luo, Qinyu Liao
openaire +1 more source
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it
Xin Luo, Qinyu Liao
openaire +1 more source
Ransomware Evolution: Solving Ransomware Attack Challenges
2020This research focuses on the world’s most frightening cybersecurity threat known as Ransomware. Ransomware is popularly described by experts as scareware that makes data and resources on a victims’ computer inaccessible and forces the victims to pay a ransom with bitcoins or through other means by frightening and intimidating them.
Muhammad Ubale Kiru, Aman Jantan
openaire +1 more source
Direito & TI, 2016
Ransomware originou-se da aglutinação das palavras ransom (resgate) e software (código/programa), ou seja, programa de/para resgate. Esse nome surgiu devido à peculiaridade de sua atuação nos dispositivos informáticos. Tal mecanismo originou as expressões “sequestro” de dados, interpretada como ato de bloquear, inutilizar ou inviabilizar o acesso à ...
openaire +2 more sources
Ransomware originou-se da aglutinação das palavras ransom (resgate) e software (código/programa), ou seja, programa de/para resgate. Esse nome surgiu devido à peculiaridade de sua atuação nos dispositivos informáticos. Tal mecanismo originou as expressões “sequestro” de dados, interpretada como ato de bloquear, inutilizar ou inviabilizar o acesso à ...
openaire +2 more sources
Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020
Cybercrime such as ransomware denies access to valuable data until a ransom is paid. Recent ransomware attacks on organizations such as hospitals, schools, government agencies and private businesses raise public awareness of the severe impact on the society.
Zhen Li, Qi Liao
openaire +1 more source
Cybercrime such as ransomware denies access to valuable data until a ransom is paid. Recent ransomware attacks on organizations such as hospitals, schools, government agencies and private businesses raise public awareness of the severe impact on the society.
Zhen Li, Qi Liao
openaire +1 more source
2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2019
Ransomware poses a major threat to information integrity and availability. This type of malware will encrypt files on infected computers and demand ransom in return to restoring access. These scale to companies and institutions with devastating consequences. The goal of this paper is to propose a solution based on low cost hardware that will serve as a
Cristian Pascariu, Ionut-Daniel Barbu
openaire +1 more source
Ransomware poses a major threat to information integrity and availability. This type of malware will encrypt files on infected computers and demand ransom in return to restoring access. These scale to companies and institutions with devastating consequences. The goal of this paper is to propose a solution based on low cost hardware that will serve as a
Cristian Pascariu, Ionut-Daniel Barbu
openaire +1 more source

