Results 31 to 40 of about 21,893 (200)
Ransomware deployment methods and analysis: views from a predictive model and human responses
Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern ...
Gavin Hull, Henna John, Budi Arief
doaj +1 more source
Studying Ransomware Attacks Using Web Search Logs
Cyber attacks are increasingly becoming prevalent and causing significant damage to individuals, businesses and even countries. In particular, ransomware attacks have grown significantly over the last decade.
Bansal, Chetan +3 more
core +1 more source
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for ...
Iman Almomani +2 more
doaj +1 more source
Artificial Intelligence: Application Today and Implications Tomorrow [PDF]
This paper analyzes the applications of artificial intelligence to the legal industry, specifically in the fields of legal research and contract drafting.
Aylward G. +5 more
core +3 more sources
A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M +4 more
core +2 more sources
Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker
Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware employs
Xiang Fang +4 more
doaj +1 more source
Open Repository for the Evaluation of Ransomware Detection Tools
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied
Eduardo Berrueta +3 more
doaj +1 more source
On the Economics of Ransomware
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with
Farhang, Sadegh +2 more
core +1 more source
CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core +3 more sources
Ransomware continues to pose a significant threat to individuals and organizations worldwide, causing disruptions, financial losses, and reputational damage.
Vhuhwavho Mokoma, Avinash Singh
doaj +1 more source

