Results 31 to 40 of about 21,893 (200)

Ransomware deployment methods and analysis: views from a predictive model and human responses

open access: yesCrime Science, 2019
Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern ...
Gavin Hull, Henna John, Budi Arief
doaj   +1 more source

Studying Ransomware Attacks Using Web Search Logs

open access: yes, 2020
Cyber attacks are increasingly becoming prevalent and causing significant damage to individuals, businesses and even countries. In particular, ransomware attacks have grown significantly over the last decade.
Bansal, Chetan   +3 more
core   +1 more source

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

open access: yesSensors, 2022
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for ...
Iman Almomani   +2 more
doaj   +1 more source

Artificial Intelligence: Application Today and Implications Tomorrow [PDF]

open access: yes, 2013
This paper analyzes the applications of artificial intelligence to the legal industry, specifically in the fields of legal research and contract drafting.
Aylward G.   +5 more
core   +3 more sources

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker

open access: yesMathematics
Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware employs
Xiang Fang   +4 more
doaj   +1 more source

Open Repository for the Evaluation of Ransomware Detection Tools

open access: yesIEEE Access, 2020
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied
Eduardo Berrueta   +3 more
doaj   +1 more source

On the Economics of Ransomware

open access: yes, 2017
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with
Farhang, Sadegh   +2 more
core   +1 more source

CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]

open access: yes, 2018
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core   +3 more sources

RanViz: Ransomware Visualization and Classification Based on Time-Series Categorical Representation of API Calls

open access: yesIEEE Access
Ransomware continues to pose a significant threat to individuals and organizations worldwide, causing disruptions, financial losses, and reputational damage.
Vhuhwavho Mokoma, Avinash Singh
doaj   +1 more source

Home - About - Disclaimer - Privacy