Results 21 to 30 of about 21,539 (179)
To pay or not: game theoretic models of ransomware [PDF]
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August +38 more
core +1 more source
Cybercrime and other cybersecurity harms are gaining increasing political and public attention across many countries. One of the most serious and fastest growing categories of such harms relates to ransomware attacks.
doaj +1 more source
Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems
Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to ...
Rana Almohaini +2 more
doaj +1 more source
Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Broadly speaking an individual can invest time and effort to avoid becoming victim to a cyber attack and/or
A Cartwright +19 more
core +2 more sources
Ransomware Detection Method Based on Dynamic Symbol Execution [PDF]
Aiming at the problem of network security caused by ransomware,based on the analysis of a large number of ransomware samples,a method of detecting and analyzing ransomware based on dynamic symbol execution is proposed.A ADRAS system model is built based ...
CHEN Zheng,FANG Yong,LIU Liang,ZUO Zheng
doaj +1 more source
The Evolution of Embedding Metadata in Blockchain Transactions [PDF]
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas +2 more
core +2 more sources
Deep dive into ransomware threat hunting and intelligence at fog layer [PDF]
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data.
Ahmadzadeh, M +6 more
core +1 more source
A cyber-kill-chain based taxonomy of crypto-ransomware features [PDF]
In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for a ransom payment to restore a custodian access or decrypt data ...
Benedetto, L +5 more
core +2 more sources
Ransomware: Analysing the Impact on Windows Active Directory Domain Services
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability.
Grant McDonald +4 more
doaj +1 more source
Studying Ransomware Attacks Using Web Search Logs
Cyber attacks are increasingly becoming prevalent and causing significant damage to individuals, businesses and even countries. In particular, ransomware attacks have grown significantly over the last decade.
Bansal, Chetan +3 more
core +1 more source

