Results 31 to 40 of about 21,539 (179)
CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core +3 more sources
Ransomware in High-Risk Environments [PDF]
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems.
Aziz, Shallaw M.
core +5 more sources
Ransomware deployment methods and analysis: views from a predictive model and human responses
Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern ...
Gavin Hull, Henna John, Budi Arief
doaj +1 more source
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for ...
Iman Almomani +2 more
doaj +1 more source
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence [PDF]
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by ...
Ahmadzadeh, M. +4 more
core +2 more sources
Bitcoin Heist Ransomware Attack Prediction Using Data Science Process [PDF]
In recent years, ransomware attacks have become a more significant source of computer penetration. Only general-purpose computing systems with sufficient resources have been harmed by ransomware so far. Numerous ransomware prediction strategies have been
Sathya T. +4 more
doaj +1 more source
Open Repository for the Evaluation of Ransomware Detection Tools
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied
Eduardo Berrueta +3 more
doaj +1 more source
On the Economics of Ransomware
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with
Farhang, Sadegh +2 more
core +1 more source
Ransomware continues to pose a significant threat to individuals and organizations worldwide, causing disruptions, financial losses, and reputational damage.
Vhuhwavho Mokoma, Avinash Singh
doaj +1 more source
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extortion ...
Philip O'Kane +2 more
doaj +1 more source

