Results 21 to 30 of about 21,893 (200)

Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File

open access: yesIEEE Access, 2023
Ransomware is a growing threat and is building ecosystems in the form of ransomware as a service (RaaS). While there have been diverse efforts to detect and mitigate such threats, techniques to bypass such countermeasures have advanced considerably ...
Soohan Lee   +4 more
doaj   +1 more source

To pay or not: game theoretic models of ransomware [PDF]

open access: yes, 2019
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August   +38 more
core   +1 more source

Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems

open access: yesApplied Sciences, 2021
Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to ...
Rana Almohaini   +2 more
doaj   +1 more source

State Crime

open access: yesState Crime, 2023
Cybercrime and other cybersecurity harms are gaining increasing political and public attention across many countries. One of the most serious and fastest growing categories of such harms relates to ransomware attacks.
doaj   +1 more source

The Evolution of Embedding Metadata in Blockchain Transactions [PDF]

open access: yes, 2018
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas   +2 more
core   +2 more sources

Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Broadly speaking an individual can invest time and effort to avoid becoming victim to a cyber attack and/or
A Cartwright   +19 more
core   +2 more sources

Ransomware Detection Method Based on Dynamic Symbol Execution [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem of network security caused by ransomware,based on the analysis of a large number of ransomware samples,a method of detecting and analyzing ransomware based on dynamic symbol execution is proposed.A ADRAS system model is built based ...
CHEN Zheng,FANG Yong,LIU Liang,ZUO Zheng
doaj   +1 more source

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

open access: yesSensors, 2022
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability.
Grant McDonald   +4 more
doaj   +1 more source

The Internet of Hackable Things [PDF]

open access: yes, 2017
The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object ...
Dragoni, Nicola   +2 more
core   +2 more sources

Ransomware in High-Risk Environments [PDF]

open access: yes, 2016
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems.
Aziz, Shallaw M
core   +5 more sources

Home - About - Disclaimer - Privacy