Results 11 to 20 of about 21,539 (179)

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Ransomware Early Detection Method Based on Deep Learning [PDF]

open access: yesJisuanji kexue, 2023
In recent years,ransomware is becoming increasingly prevalent,causing serious economic losses.Since files encrypted by ransomware are difficult to recover,how to timely and accurately detect ransomware is a hot point nowadays.To improve the timeliness ...
LIU Wenjing, GUO Chun, SHEN Guowei, XIE Bo, LYU Xiaodan
doaj   +1 more source

A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning

open access: yesApplied Sciences, 2020
Desktop and portable platform-based information systems become the most tempting target of crypto and locker ransomware attacks during the last decades.
Hiba Zuhair, Ali Selamat, Ondrej Krejcar
doaj   +1 more source

Retaliation against Ransomware in Cloud-Enabled PureOS System

open access: yesMathematics, 2023
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades.
Atef Ibrahim   +4 more
doaj   +1 more source

Analysis of Crypto-Ransomware Using Network Traffic

open access: yesJournal of Information Security and Cybercrimes Research, 2022
Ransomware is a form of malware attack that makes use of encryption to make information inaccessible for the motive of gathering a specified amount of payment.
Otasowie Owolafe, Aderonke F. Thompson
doaj   +1 more source

Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions

open access: yesApplied Sciences, 2021
Ransomware is an ill-famed malware that has received recognition because of its lethal and irrevocable effects on its victims. The irreparable loss caused due to ransomware requires the timely detection of these attacks. Several studies including surveys
Umara Urooj   +4 more
doaj   +1 more source

NAS-ransomware: hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen

open access: yesTijdschrift voor Veiligheid, 2022
NAS Ransomware: how ransomware targeting NAS devices differs from regular ransomware attacks The present study examines the impact of ransomware against Network Attached Storage (NAS) devices. NAS devices are external hard drives which are usually easily accessible through the internet.
Meurs, Tom   +3 more
openaire   +2 more sources

Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File

open access: yesIEEE Access, 2023
Ransomware is a growing threat and is building ecosystems in the form of ransomware as a service (RaaS). While there have been diverse efforts to detect and mitigate such threats, techniques to bypass such countermeasures have advanced considerably ...
Soohan Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy