Results 21 to 30 of about 21,539 (179)

To pay or not: game theoretic models of ransomware [PDF]

open access: yes, 2019
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August   +38 more
core   +1 more source

State Crime

open access: yesState Crime, 2023
Cybercrime and other cybersecurity harms are gaining increasing political and public attention across many countries. One of the most serious and fastest growing categories of such harms relates to ransomware attacks.
doaj   +1 more source

Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems

open access: yesApplied Sciences, 2021
Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to ...
Rana Almohaini   +2 more
doaj   +1 more source

Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Broadly speaking an individual can invest time and effort to avoid becoming victim to a cyber attack and/or
A Cartwright   +19 more
core   +2 more sources

Ransomware Detection Method Based on Dynamic Symbol Execution [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem of network security caused by ransomware,based on the analysis of a large number of ransomware samples,a method of detecting and analyzing ransomware based on dynamic symbol execution is proposed.A ADRAS system model is built based ...
CHEN Zheng,FANG Yong,LIU Liang,ZUO Zheng
doaj   +1 more source

The Evolution of Embedding Metadata in Blockchain Transactions [PDF]

open access: yes, 2018
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas   +2 more
core   +2 more sources

Deep dive into ransomware threat hunting and intelligence at fog layer [PDF]

open access: yes, 2018
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data.
Ahmadzadeh, M   +6 more
core   +1 more source

A cyber-kill-chain based taxonomy of crypto-ransomware features [PDF]

open access: yes, 2019
In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for a ransom payment to restore a custodian access or decrypt data ...
Benedetto, L   +5 more
core   +2 more sources

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

open access: yesSensors, 2022
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability.
Grant McDonald   +4 more
doaj   +1 more source

Studying Ransomware Attacks Using Web Search Logs

open access: yes, 2020
Cyber attacks are increasingly becoming prevalent and causing significant damage to individuals, businesses and even countries. In particular, ransomware attacks have grown significantly over the last decade.
Bansal, Chetan   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy