Results 31 to 40 of about 21,539 (179)

CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]

open access: yes, 2018
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core   +3 more sources

Ransomware in High-Risk Environments [PDF]

open access: yes, 2016
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems.
Aziz, Shallaw M.
core   +5 more sources

Ransomware deployment methods and analysis: views from a predictive model and human responses

open access: yesCrime Science, 2019
Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern ...
Gavin Hull, Henna John, Budi Arief
doaj   +1 more source

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

open access: yesSensors, 2022
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for ...
Iman Almomani   +2 more
doaj   +1 more source

Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence [PDF]

open access: yes, 2017
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by ...
Ahmadzadeh, M.   +4 more
core   +2 more sources

Bitcoin Heist Ransomware Attack Prediction Using Data Science Process [PDF]

open access: yesE3S Web of Conferences, 2023
In recent years, ransomware attacks have become a more significant source of computer penetration. Only general-purpose computing systems with sufficient resources have been harmed by ransomware so far. Numerous ransomware prediction strategies have been
Sathya T.   +4 more
doaj   +1 more source

Open Repository for the Evaluation of Ransomware Detection Tools

open access: yesIEEE Access, 2020
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied
Eduardo Berrueta   +3 more
doaj   +1 more source

On the Economics of Ransomware

open access: yes, 2017
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with
Farhang, Sadegh   +2 more
core   +1 more source

RanViz: Ransomware Visualization and Classification Based on Time-Series Categorical Representation of API Calls

open access: yesIEEE Access
Ransomware continues to pose a significant threat to individuals and organizations worldwide, causing disruptions, financial losses, and reputational damage.
Vhuhwavho Mokoma, Avinash Singh
doaj   +1 more source

Evolution of ransomware

open access: yesIET Networks, 2018
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extortion ...
Philip O'Kane   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy