Results 11 to 20 of about 21,539 (179)
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Ransomware Early Detection Method Based on Deep Learning [PDF]
In recent years,ransomware is becoming increasingly prevalent,causing serious economic losses.Since files encrypted by ransomware are difficult to recover,how to timely and accurately detect ransomware is a hot point nowadays.To improve the timeliness ...
LIU Wenjing, GUO Chun, SHEN Guowei, XIE Bo, LYU Xiaodan
doaj +1 more source
A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning
Desktop and portable platform-based information systems become the most tempting target of crypto and locker ransomware attacks during the last decades.
Hiba Zuhair, Ali Selamat, Ondrej Krejcar
doaj +1 more source
Retaliation against Ransomware in Cloud-Enabled PureOS System
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades.
Atef Ibrahim +4 more
doaj +1 more source
Analysis of Crypto-Ransomware Using Network Traffic
Ransomware is a form of malware attack that makes use of encryption to make information inaccessible for the motive of gathering a specified amount of payment.
Otasowie Owolafe, Aderonke F. Thompson
doaj +1 more source
Ransomware is an ill-famed malware that has received recognition because of its lethal and irrevocable effects on its victims. The irreparable loss caused due to ransomware requires the timely detection of these attacks. Several studies including surveys
Umara Urooj +4 more
doaj +1 more source
NAS Ransomware: how ransomware targeting NAS devices differs from regular ransomware attacks The present study examines the impact of ransomware against Network Attached Storage (NAS) devices. NAS devices are external hard drives which are usually easily accessible through the internet.
Meurs, Tom +3 more
openaire +2 more sources
Ransomware is a growing threat and is building ecosystems in the form of ransomware as a service (RaaS). While there have been diverse efforts to detect and mitigate such threats, techniques to bypass such countermeasures have advanced considerably ...
Soohan Lee +4 more
doaj +1 more source

